Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-pj96-4jhv-v792: Cross site scripting via cookies in gogs

Impact

There is no known practical impact other than it is just possible to manipulate CSRF cookie and XSS the malicious user self.

Patches

Invalid characters of CSRF tokens are stripped after reading cookie. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.

Workarounds

No need for workarounds.

References

N/A

For more information

If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6953.

ghsa
#xss#csrf#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-pj96-4jhv-v792

Cross site scripting via cookies in gogs

Low severity GitHub Reviewed Published Jun 2, 2022 in gogs/gogs • Updated Jun 2, 2022

Package

gomod gogs.io/gogs (Go )

Affected versions

< 0.12.8

Description

Impact

There is no known practical impact other than it is just possible to manipulate CSRF cookie and XSS the malicious user self.

Patches

Invalid characters of CSRF tokens are stripped after reading cookie. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.

Workarounds

No need for workarounds.

References

N/A

For more information

If you have any questions or comments about this advisory, please post on gogs/gogs#6953.

References

  • GHSA-pj96-4jhv-v792
  • gogs/gogs#6953

Weaknesses

GHSA ID

GHSA-pj96-4jhv-v792

Source code

ghsa: Latest News

GHSA-w7qr-q9fh-fj35: Dozzle uses unsafe hash for passwords