Vulnerability Details : CVE-2022-0415
Remote Command Execution in uploading repository file in GitHub repository gogs/gogs prior to 0.12.6.
Vulnerability category: Input validation
Products affected by CVE-2022-0415
- cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-0415
20.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-0415
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
9.9
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
3.1
|
6.0
|
huntr.dev | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2022-0415
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security@huntr.dev (Secondary)
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-0415
-
https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902
Remote Command Execution in uploading repository file vulnerability found in gogsExploit;Patch;Third Party Advisory
-
https://github.com/gogs/gogs/commit/0fef3c9082269e9a4e817274942a5d7c50617284
repo_editor: check upload `TreePath` and file name (#6838) · gogs/gogs@0fef3c9 · GitHubPatch;Third Party Advisory
Jump to