Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g6xv-8q23-w2q3 | SQL Injection in Gogs |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:26:02.264Z
Reserved: 2014-11-07T00:00:00
Link: CVE-2014-8682
No data.
Status : Deferred
Published: 2014-11-21T15:59:09.773
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-8682
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA