The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-3615 The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
Github GHSA Github GHSA GHSA-vm62-9jw3-c8w3 Gogs has an argument Injection in the built-in SSH server
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Apr 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Gogs
Gogs gogs
CPEs cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*
Vendors & Products Gogs
Gogs gogs

Mon, 19 Aug 2024 08:30:00 +0000


Mon, 12 Aug 2024 20:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-88

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-28T15:22:31.592925

Reserved: 2024-07-04T00:00:00

Link: CVE-2024-39930

cve-icon Vulnrichment

Updated: 2024-08-19T07:47:42.608Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-04T16:15:02.277

Modified: 2025-04-11T15:14:27.963

Link: CVE-2024-39930

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.