An open API service providing security vulnerability metadata for many open source software ecosystems.

GSA_kwCzR0hTQS01Z2poLTVqNGYtY3B3ds02Hg

High EPSS: 0.7933% (0.99005 Percentile) EPSS:

Unrestricted Upload of File with Dangerous Type in Gogs

Affected Packages Affected Versions Fixed Versions
go:gogs.io/gogs
PURL: pkg:go/gogs.io%2Fgogs
< 0.12.6 0.12.6
2 Dependent packages
1 Dependent repositories

Affected Version Ranges

All affected versions

0.2.0, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.5.0, 0.5.2, 0.5.5, 0.5.8, 0.5.9, 0.5.11, 0.5.13, 0.6.0, 0.6.1, 0.6.3, 0.6.5, 0.6.9, 0.6.15, 0.7.0, 0.7.6, 0.7.19, 0.7.22, 0.7.33, 0.8.0, 0.8.10, 0.8.25, 0.8.43, 0.9.0, 0.9.13, 0.9.46, 0.9.48, 0.9.60, 0.9.71, 0.9.97, 0.9.113, 0.9.128, 0.9.141, 0.10.1, 0.10.8, 0.10.18, 0.11.4, 0.11.19, 0.11.29, 0.11.33, 0.11.34, 0.11.43, 0.11.53, 0.11.66, 0.11.79, 0.11.86, 0.11.91, 0.12.0, 0.12.1, 0.12.2, 0.12.3, 0.12.4, 0.12.5

All unaffected versions

0.12.6, 0.12.7, 0.12.8, 0.12.9, 0.12.10, 0.12.11, 0.13.0

Impact

The malicious user is able to upload a crafted config file into repository's .git directory with to gain SSH access to the server. All installations with repository upload enabled (default) are affected.

Patches

Repository file uploads are prohibited to its .git directory. Users should upgrade to 0.12.6 or the latest 0.13.0+dev.

Workarounds

Disable repository files upload.

References

https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902/

For more information

If you have any questions or comments about this advisory, please post on #6833.

References: