Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3610 | Remote Command Execution in file editing in gogs |
Github GHSA |
GHSA-r7j8-5h9c-f6fx | Remote Command Execution in file editing in gogs |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 10 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gogs
Gogs gogs |
|
| CPEs | cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gogs
Gogs gogs |
Tue, 24 Dec 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 23 Dec 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gogs is an open source self-hosted Git service. A malicious user is able to commit and edit a crafted symlink file to a repository to gain SSH access to the server. The vulnerability is fixed in 0.13.1. | |
| Title | Gogs has a Path Traversal in file editing UI | |
| Weaknesses | CWE-22 CWE-61 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-12-24T01:52:58.173Z
Reserved: 2024-11-29T18:02:16.756Z
Link: CVE-2024-54148
Updated: 2024-12-24T01:52:53.186Z
Status : Analyzed
Published: 2024-12-23T16:15:07.010
Modified: 2025-04-10T14:48:03.227
Link: CVE-2024-54148
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA