CVE-2014-8681: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
(updated )
SQL injection vulnerability in the GetIssues function in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.6.x before 0.5.6.1025 Beta allows remote attackers to execute arbitrary SQL commands via the label parameter to user/repos/issues.
References
- gogs.io/docs/intro/change_log.html
- packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html
- seclists.org/fulldisclosure/2014/Nov/31
- exchange.xforce.ibmcloud.com/vulnerabilities/98695
- github.com/advisories/GHSA-mr6h-chqp-p9g2
- github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8
- github.com/gogits/gogs/releases/tag/v0.5.8
- github.com/gogs/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8
- nvd.nist.gov/vuln/detail/CVE-2014-8681
- pkg.go.dev/vuln/GO-2020-0021
- seclists.org/fulldisclosure/2014/Nov/31
- web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8681
- www.exploit-db.com/exploits/35237
Detect and mitigate CVE-2014-8681 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →