GHSA-xq4v-vrp9-vcf2

Suggest an improvement
Source
https://github.com/advisories/GHSA-xq4v-vrp9-vcf2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-xq4v-vrp9-vcf2/GHSA-xq4v-vrp9-vcf2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xq4v-vrp9-vcf2
Aliases
Related
Published
2022-06-08T22:24:25Z
Modified
2024-08-21T15:26:42.088920Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Cross-site Scripting vulnerability in repository issue list in Gogs
Details

Impact

DisplayName allows all the characters from users, which leads to an XSS vulnerability when directly displayed in the issue list.

Patches

DisplayName is sanitized before being displayed. Users should upgrade to 0.12.9 or the latest 0.13.0+dev.

Workarounds

Check and update the existing users' display names that contain malicious characters.

References

N/A

For more information

If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/pull/7009.

Database specific
{
    "nvd_published_at": "2022-06-09T17:15:00Z",
    "github_reviewed_at": "2022-06-08T22:24:25Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-79",
        "CWE-80"
    ]
}
References

Affected packages

Go / gogs.io/gogs

Package

Name
gogs.io/gogs
View open source insights on deps.dev
Purl
pkg:golang/gogs.io/gogs

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.12.9