-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Stored XSS Assignee #7145
Comments
Hi team and @unknwon , attaching to the issue our disclosure policy that we already sent in email - https://www.mend.io/vulnerability-database/disclosure-policy/ |
Hi team, Disclosure timeline has passed and there was no response in mails or in the issue, as of that we opened a CVE ID: CVE ID - https://nvd.nist.gov/vuln/detail/CVE-2022-32174 Sincerely, |
The patch has landed on 0.13.0+dev and will be back-ported to 0.12.11 (no ETA). Thanks again for reporting! |
I want to avoid touching the ancient |
The 0.12.11 has been released that includes the patch of the reported issue. |
Describe the bug
Stored Cross-Site Scripting (XSS) in the select assignee component | Mend
Additional context
Hi team, following your security policy request for sharing high-level vulnerability information, you can find it below.
Full report sent in mail to [email protected].
In Gogs, versions v0.6.5 through v0.12.10 are vulnerable to Stored Cross-Site Scripting (XSS) that leads to an account takeover, in the select assignee component. When an admin selects an assignee from the user’s list, the malicious JavaScript payload in the first name executes that allows an attacker to gain admin privileges.
Contact: [email protected] or [email protected]
The text was updated successfully, but these errors were encountered: