Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3615 | The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected. |
Github GHSA |
GHSA-vm62-9jw3-c8w3 | Gogs has an argument Injection in the built-in SSH server |
Fri, 11 Apr 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gogs
Gogs gogs |
|
| CPEs | cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gogs
Gogs gogs |
Mon, 19 Aug 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 12 Aug 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-88 |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-28T15:22:31.592Z
Reserved: 2024-07-04T00:00:00.000Z
Link: CVE-2024-39930
Updated: 2024-08-19T07:47:42.608Z
Status : Analyzed
Published: 2024-07-04T16:15:02.277
Modified: 2025-04-11T15:14:27.963
Link: CVE-2024-39930
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA