Race Condition Enabling Link Following Affecting github.com/gogs/gogs/internal/route/repo package, versions >=0.0.0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMGOGSGOGSINTERNALROUTEREPO-8383161
- published 17 Nov 2024
- disclosed 15 Nov 2024
- credit Unknown
Introduced: 15 Nov 2024
New CVE-2024-44625 Open this link in a new tabHow to fix?
There is no fixed version for github.com/gogs/gogs/internal/route/repo
.
Overview
Affected versions of this package are vulnerable to Race Condition Enabling Link Following in the editFilePost()
function's handling of symlinks to nonexistent files. The /:username/:reponame/_edit/:branch/:filepath
endpoint may accept such a link to a nonexistent file, and an attacker who can place a malicious server-side Git hook in the target repository can cause its contents to be triggered when the repo is modified. The attacker must have permissions to push to a repository and edit files via the web interface,