Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-xq4v-vrp9-vcf2: Cross-site Scripting vulnerability in repository issue list in Gogs

Impact

DisplayName allows all the characters from users, which leads to an XSS vulnerability when directly displayed in the issue list.

Patches

DisplayName is sanitized before being displayed. Users should upgrade to 0.12.9 or the latest 0.13.0+dev.

Workarounds

Check and update the existing users’ display names that contain malicious characters.

References

N/A

For more information

If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/pull/7009.

ghsa
#xss#vulnerability#git

Impact

DisplayName allows all the characters from users, which leads to an XSS vulnerability when directly displayed in the issue list.

Patches

DisplayName is sanitized before being displayed. Users should upgrade to 0.12.9 or the latest 0.13.0+dev.

Workarounds

Check and update the existing users’ display names that contain malicious characters.

References

N/A

For more information

If you have any questions or comments about this advisory, please post on gogs/gogs#7009.

References

  • GHSA-xq4v-vrp9-vcf2
  • gogs/gogs#7009
  • https://github.com/gogs/gogs/releases/tag/v0.12.9

Related news

CVE-2022-31038: issues: sanitize `DisplayName` (#7009) · gogs/gogs@155cae1

Gogs is an open source self-hosted Git service. In versions of gogs prior to 0.12.9 `DisplayName` does not filter characters input from users, which leads to an XSS vulnerability when directly displayed in the issue list. This issue has been resolved in commit 155cae1d which sanitizes `DisplayName` prior to display to the user. All users of gogs are advised to upgrade. Users unable to upgrade should check their users' display names for malicious characters.

ghsa: Latest News

GHSA-rxq8-q85f-m866: Prevent XSS from Confidant API call