First published: Thu Jun 02 2022(Updated: )
### Impact The malicious user is able to upload a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All Windows installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected. ### Patches Repository file uploads are prohibited to its `.git` directory. Users should upgrade to 0.12.8 or the latest 0.13.0+dev. ### Workarounds [Disable repository files upload](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L128-L129). ### References https://www.huntr.dev/bounties/9cd4e7b7-0979-4e5e-9a1c-388b58dea76b/ ### For more information If you have any questions or comments about this advisory, please post on #6968.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
go/gogs.io/gogs | <0.12.8 | 0.12.8 |
All of | ||
Gogs | <=0.12.7 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1884 is considered a high severity vulnerability that allows malicious users to upload a crafted config file for unauthorized SSH access.
To fix CVE-2022-1884, update your Gogs installation to version 0.12.8 or later.
CVE-2022-1884 affects Gogs versions prior to 0.12.8, specifically versions 0.12.7 and earlier.
No, while the issue has been noted on Windows installations, it is primarily related to Gogs regardless of platform.
The impact of CVE-2022-1884 is that an attacker can gain unauthorized SSH access to the server through a maliciously crafted config file.