GHSA-g6xv-8q23-w2q3

Suggest an improvement
Source
https://github.com/advisories/GHSA-g6xv-8q23-w2q3
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-g6xv-8q23-w2q3/GHSA-g6xv-8q23-w2q3.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g6xv-8q23-w2q3
Aliases
Published
2021-06-29T18:32:48Z
Modified
2024-08-21T15:58:52.308849Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
SQL Injection in Gogs
Details

Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2021-05-20T16:59:51Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-89"
    ]
}
References

Affected packages

Go / gogs.io/gogs

Package

Name
gogs.io/gogs
View open source insights on deps.dev
Purl
pkg:golang/gogs.io/gogs

Affected ranges

Type
SEMVER
Events
Introduced
0.3.1
Fixed
0.5.8