Gogs is an open source self-hosted Git service. In versions of gogs prior to 0.12.9 `DisplayName` does not filter characters input from users, which leads to an XSS vulnerability when directly displayed in the issue list. This issue has been resolved in commit 155cae1d which sanitizes `DisplayName` prior to display to the user. All users of gogs are advised to upgrade. Users unable to upgrade should check their users' display names for malicious characters.
References
Link | Resource |
---|---|
https://github.com/gogs/gogs/commit/155cae1de8916fc3fde78f350763034b7422caee | Patch Third Party Advisory |
https://github.com/gogs/gogs/pull/7009 | Issue Tracking Third Party Advisory |
https://github.com/gogs/gogs/security/advisories/GHSA-xq4v-vrp9-vcf2 | Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2022-06-09 10:15
Updated : 2022-06-17 12:24
NVD link : CVE-2022-31038
Mitre link : CVE-2022-31038
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
gogs
- gogs