SQL Injection Affecting gogs.io/gogs package, versions <0.5.8
Threat Intelligence
Exploit Maturity
Mature
EPSS
0.54% (78th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GOGSIOGOGS-1083912
- published 5 Nov 2014
- disclosed 5 Nov 2014
- credit Unknown
How to fix?
Upgrade gogs.io/gogs
to version 0.5.8 or higher.
Overview
Affected versions of this package are vulnerable to SQL Injection. Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
CVSS Scores
version 3.1