The malicious user is able to update a crafted config
file into repository's .git
directory in combination with crafted file deletion to gain SSH access to the server on case-insensitive file systems. All installations with repository upload enabled (default) on case-insensitive file systems (Windows, macOS, etc.) are affected.
Make sanitization of upload path to .git
directory to be case-insensitive. Users should upgrade to 0.12.11 or the latest 0.13.0+dev.
Disable repository upload.
https://huntr.dev/bounties/18cf9256-23ab-4098-a769-85f8da130f97/
If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/7030.
{ "nvd_published_at": "2023-02-25T08:15:00Z", "github_reviewed_at": "2023-02-28T20:12:11Z", "severity": "CRITICAL", "github_reviewed": true, "cwe_ids": [ "CWE-78" ] }