First published: Wed Aug 08 2018(Updated: )
Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gogs Gogs | <0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15178 is an open redirect vulnerability in Gogs before version 0.12.
CVE-2018-15178 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks by manipulating the redirect_to parameter in the user/login function.
CVE-2018-15178 has a severity rating of 6.1 (Medium).
To fix CVE-2018-15178, you should update Gogs to version 0.12 or higher.
You can find more information about CVE-2018-15178 on the GitHub issue [#5364](https://github.com/gogs/gogs/issues/5364) and pull request [#5365](https://github.com/gogs/gogs/pull/5365).