GMS-2022-439: SSRF in repository migration
(updated )
Impact
The malicious user is able to discover services in the internal network through repository migration functionality. All installations accepting public traffic are affected.
Patches
Internal network CIDRs are prohibited to be used as repository migration targets. Users should upgrade to 0.12.5 or the latest 0.13.0+dev.
Workarounds
Run Gogs in its own private network.
References
https://www.huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531/
For more information
If you have any questions or comments about this advisory, please post on #6754.
References
Detect and mitigate GMS-2022-439 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →