First published: Fri Oct 16 2020(Updated: )
The git hook feature in Gogs 0.5.5 through 0.12.2 allows for authenticated remote code execution. There can be a privilege escalation if access to this hook feature is granted to a user who does not have administrative privileges. NOTE: because this is mentioned in the documentation but not in the UI, it could be considered a "Product UI does not Warn User of Unsafe Actions" issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gogs Gogs | >=0.5.5<=0.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15867 is a vulnerability in the git hook feature of Gogs 0.5.5 through 0.12.2 that allows for authenticated remote code execution.
The severity of CVE-2020-15867 is high with a CVSS score of 7.2.
CVE-2020-15867 affects Gogs versions 0.5.5 through 0.12.2 by allowing authenticated users to execute remote code through the git hook feature.
Yes, there can be a privilege escalation if a user without administrative privileges is granted access to the git hook feature.
To fix CVE-2020-15867, users are recommended to update Gogs to a version that is not affected, or apply any patches or security updates provided by the Gogs development team.