Path Traversal in Git HTTP endpoints in Gogs
Description
Published to the GitHub Advisory Database
Jun 8, 2022
Reviewed
Jun 8, 2022
Published by the National Vulnerability Database
Jun 9, 2022
Last updated
Jan 27, 2023
Impact
The malicious user is able to craft HTTP requests to access unauthorized Git directories. All installations with are affected.
Patches
Path cleaning has accommodated for Git HTTP endpoints. Users should upgrade to 0.12.9 or the latest 0.13.0+dev.
Workarounds
N/A
References
https://huntr.dev/bounties/22f9c074-cf60-4c67-b5c4-72fdf312609d/
For more information
If you have any questions or comments about this advisory, please post on #7002.
References