CVE-2018-15178

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-15178
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-15178.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-15178
Aliases
Withdrawn
2024-05-15T05:33:44.469244Z
Published
2018-08-08T00:29:02Z
Modified
2024-08-21T15:58:35.052113Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go.

References

Affected packages

Git / github.com/gogs/gogs

Affected ranges

Type
GIT
Repo
https://github.com/gogs/gogs
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.10
v0.10.1
v0.10.18
v0.10.8
v0.10rc
v0.11
v0.11.19
v0.11.29
v0.11.33
v0.11.34
v0.11.4
v0.11.43
v0.11.53
v0.11.66
v0.11.79
v0.11.86
v0.11.91
v0.11rc
v0.2.0
v0.3.0
v0.3.1
v0.4.0
v0.4.1
v0.4.2
v0.5.0
v0.5.11
v0.5.13
v0.5.2
v0.5.5
v0.5.8
v0.5.9
v0.6.0
v0.6.1
v0.6.15
v0.6.3
v0.6.5
v0.6.9
v0.7.0
v0.7.19
v0.7.22
v0.7.33
v0.7.6
v0.8.0
v0.8.10
v0.8.25
v0.8.43
v0.9.0
v0.9.113
v0.9.128
v0.9.13
v0.9.141
v0.9.46
v0.9.48
v0.9.60
v0.9.71
v0.9.97