Unprivileged user accounts with at least one SSH key can read arbitrary files on the system. For instance, they could leak the configuration files that could contain database credentials ([database] *
) and [security] SECRET_KEY
. Attackers could also exfiltrate TLS certificates, other users' repositories, and the Gogs database when the SQLite driver is enabled.
Unintended Git options has been ignored for creating tags (https://github.com/gogs/gogs/pull/7872). Users should upgrade to 0.13.1 or the latest 0.14.0+dev.
No viable workaround available, please only grant access to trusted users to your Gogs instance on affected versions.
https://www.cve.org/CVERecord?id=CVE-2024-39933
{ "nvd_published_at": null, "cwe_ids": [ "CWE-88" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-12-23T20:38:12Z" }