Impact
The malicious user is able to update a crafted config
file into repository's .git
directory in combination with crafted file deletion to gain SSH access to the server on case-insensitive file systems. All installations with repository upload enabled (default) on case-insensitive file systems (Windows, macOS, etc.) are affected.
Patches
Make sanitization of upload path to .git
directory to be case-insensitive. Users should upgrade to 0.12.11 or the latest 0.13.0+dev.
Workarounds
Disable repository upload.
References
https://huntr.dev/bounties/18cf9256-23ab-4098-a769-85f8da130f97/
For more information
If you have any questions or comments about this advisory, please post on gogs/gogs#7030.
References
Impact
The malicious user is able to update a crafted
config
file into repository's.git
directory in combination with crafted file deletion to gain SSH access to the server on case-insensitive file systems. All installations with repository upload enabled (default) on case-insensitive file systems (Windows, macOS, etc.) are affected.Patches
Make sanitization of upload path to
.git
directory to be case-insensitive. Users should upgrade to 0.12.11 or the latest 0.13.0+dev.Workarounds
Disable repository upload.
References
https://huntr.dev/bounties/18cf9256-23ab-4098-a769-85f8da130f97/
For more information
If you have any questions or comments about this advisory, please post on gogs/gogs#7030.
References