The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
Metrics
Affected Vendors & Products
References
History
Fri, 11 Apr 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gogs
Gogs gogs |
|
CPEs | cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gogs
Gogs gogs |
Mon, 19 Aug 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 12 Aug 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-88 |

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-28T15:22:31.592925
Reserved: 2024-07-04T00:00:00
Link: CVE-2024-39930

Updated: 2024-08-19T07:47:42.608Z

Status : Analyzed
Published: 2024-07-04T16:15:02.277
Modified: 2025-04-11T15:14:27.963
Link: CVE-2024-39930

No data.