GHSA-p69r-v3h4-rj4f: Duplicate Advisory: github.com/gogs/gogs affected by CVE-2024-39930
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-vm62-9jw3-c8w3. This link is maintained to preserve external references.
Original Description
The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious –split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
References
- github.com/advisories/GHSA-p69r-v3h4-rj4f
- github.com/gogs/gogs
- github.com/gogs/gogs/releases
- nvd.nist.gov/vuln/detail/CVE-2024-39930
- www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1
- www.vicarius.io/vsociety/posts/argument-injection-in-gogs-ssh-server-cve-2024-39930
Detect and mitigate GHSA-p69r-v3h4-rj4f with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →