You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
Regenerate three UNREVIEWED reports that now have
a GHSA available.
- data/reports/GO-2024-2965.yaml
- data/reports/GO-2024-2969.yaml
- data/reports/GO-2024-2974.yaml
Updates #2965
Updates #2969
Updates #2974
Change-Id: I5f5b9fc105520c831e598dc591d04b9e81347d3d
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/601375
Reviewed-by: Damien Neil <dneil@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Advisory CVE-2024-39930 references a vulnerability in the following Go modules:
Description:
The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: