Headline
GHSA-xq4v-vrp9-vcf2: Cross-site Scripting vulnerability in repository issue list in Gogs
Impact
DisplayName
allows all the characters from users, which leads to an XSS vulnerability when directly displayed in the issue list.
Patches
DisplayName
is sanitized before being displayed. Users should upgrade to 0.12.9 or the latest 0.13.0+dev.
Workarounds
Check and update the existing users’ display names that contain malicious characters.
References
N/A
For more information
If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/pull/7009.
Impact
DisplayName allows all the characters from users, which leads to an XSS vulnerability when directly displayed in the issue list.
Patches
DisplayName is sanitized before being displayed. Users should upgrade to 0.12.9 or the latest 0.13.0+dev.
Workarounds
Check and update the existing users’ display names that contain malicious characters.
References
N/A
For more information
If you have any questions or comments about this advisory, please post on gogs/gogs#7009.
References
- GHSA-xq4v-vrp9-vcf2
- gogs/gogs#7009
- https://github.com/gogs/gogs/releases/tag/v0.12.9
Related news
Gogs is an open source self-hosted Git service. In versions of gogs prior to 0.12.9 `DisplayName` does not filter characters input from users, which leads to an XSS vulnerability when directly displayed in the issue list. This issue has been resolved in commit 155cae1d which sanitizes `DisplayName` prior to display to the user. All users of gogs are advised to upgrade. Users unable to upgrade should check their users' display names for malicious characters.