Headline
GHSA-pj96-4jhv-v792: Cross site scripting via cookies in gogs
Impact
There is no known practical impact other than it is just possible to manipulate CSRF cookie and XSS the malicious user self.
Patches
Invalid characters of CSRF tokens are stripped after reading cookie. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.
Workarounds
No need for workarounds.
References
N/A
For more information
If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6953.
- GitHub Advisory Database
- GitHub Reviewed
- GHSA-pj96-4jhv-v792
Cross site scripting via cookies in gogs
Low severity GitHub Reviewed Published Jun 2, 2022 in gogs/gogs • Updated Jun 2, 2022
Package
gomod gogs.io/gogs (Go )
Affected versions
< 0.12.8
Description
Impact
There is no known practical impact other than it is just possible to manipulate CSRF cookie and XSS the malicious user self.
Patches
Invalid characters of CSRF tokens are stripped after reading cookie. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.
Workarounds
No need for workarounds.
References
N/A
For more information
If you have any questions or comments about this advisory, please post on gogs/gogs#6953.
References
- GHSA-pj96-4jhv-v792
- gogs/gogs#6953
Weaknesses
GHSA ID
GHSA-pj96-4jhv-v792
Source code