The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3615 | The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected. |
Github GHSA |
GHSA-vm62-9jw3-c8w3 | Gogs has an argument Injection in the built-in SSH server |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 11 Apr 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gogs
Gogs gogs |
|
| CPEs | cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gogs
Gogs gogs |
Mon, 19 Aug 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 12 Aug 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-88 |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-28T15:22:31.592925
Reserved: 2024-07-04T00:00:00
Link: CVE-2024-39930
Updated: 2024-08-19T07:47:42.608Z
Status : Analyzed
Published: 2024-07-04T16:15:02.277
Modified: 2025-04-11T15:14:27.963
Link: CVE-2024-39930
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA