Description
Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
Published: 2014-11-21
Score: 7.5 High
EPSS: 76.9% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g6xv-8q23-w2q3 SQL Injection in Gogs
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T13:26:02.264Z

Reserved: 2014-11-07T00:00:00.000Z

Link: CVE-2014-8682

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-11-21T15:59:09.773

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-8682

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses