Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1wajk2LTRqaHYtdjc5Ms4AArT9
Cross site scripting via cookies in gogs
Impact
There is no known practical impact other than it is just possible to manipulate CSRF cookie and XSS the malicious user self.
Patches
Invalid characters of CSRF tokens are stripped after reading cookie. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.
Workarounds
No need for workarounds.
References
N/A
For more information
If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6953.
Permalink: https://github.com/advisories/GHSA-pj96-4jhv-v792JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wajk2LTRqaHYtdjc5Ms4AArT9
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago
Identifiers: GHSA-pj96-4jhv-v792
References:
- https://github.com/gogs/gogs/security/advisories/GHSA-pj96-4jhv-v792
- https://github.com/gogs/gogs/issues/6953
- https://github.com/advisories/GHSA-pj96-4jhv-v792
Blast Radius: 0.0
Affected Packages
go:gogs.io/gogs
Dependent packages: 2Dependent repositories: 1
Downloads:
Affected Version Ranges: < 0.12.8
Fixed in: 0.12.8
All affected versions: 0.2.0, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.5.0, 0.5.2, 0.5.5, 0.5.8, 0.5.9, 0.5.11, 0.5.13, 0.6.0, 0.6.1, 0.6.3, 0.6.5, 0.6.9, 0.6.15, 0.7.0, 0.7.6, 0.7.19, 0.7.22, 0.7.33, 0.8.0, 0.8.10, 0.8.25, 0.8.43, 0.9.0, 0.9.13, 0.9.46, 0.9.48, 0.9.60, 0.9.71, 0.9.97, 0.9.113, 0.9.128, 0.9.141, 0.10.1, 0.10.8, 0.10.18, 0.11.4, 0.11.19, 0.11.29, 0.11.33, 0.11.34, 0.11.43, 0.11.53, 0.11.66, 0.11.79, 0.11.86, 0.11.91, 0.12.0, 0.12.1, 0.12.2, 0.12.3, 0.12.4, 0.12.5, 0.12.6, 0.12.7
All unaffected versions: 0.12.8, 0.12.9, 0.12.10, 0.12.11, 0.13.0