Description
Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.
Published: 2024-11-15
Score: 8.8 High
EPSS: 75.1% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-phm4-wf3h-pc3r Remote Code Execution in Gogs
History

Wed, 20 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 19 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Gogs
Gogs gogs
Weaknesses CWE-22
CPEs cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*
Vendors & Products Gogs
Gogs gogs
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 15 Nov 2024 17:00:00 +0000

Type Values Removed Values Added
Description Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-11-20T20:20:11.482Z

Reserved: 2024-08-21T00:00:00.000Z

Link: CVE-2024-44625

cve-icon Vulnrichment

Updated: 2024-11-20T20:19:37.485Z

cve-icon NVD

Status : Modified

Published: 2024-11-15T17:15:20.260

Modified: 2024-11-21T09:36:48.733

Link: CVE-2024-44625

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses