Lucene search

K
attackerkbAttackerKBAKB:4C729197-0C0F-4D93-BAA6-D11C0DEFC134
HistoryOct 16, 2020 - 12:00 a.m.

CVE-2020-15867

2020-10-1600:00:00
attackerkb.com
45

0.973 High

EPSS

Percentile

99.9%

The git hook feature in Gogs 0.5.5 through 0.12.2 allows for authenticated remote code execution. There can be a privilege escalation if access to this hook feature is granted to a user who does not have administrative privileges. NOTE: because this is mentioned in the documentation but not in the UI, it could be considered a β€œProduct UI does not Warn User of Unsafe Actions” issue.

Recent assessments:

cdelafuente-r7 at April 09, 2021 5:09pm UTC reported:

This vulnerability is similar to the Gitea vulnerability identified as CVE-2020-14144 (Gitea is a fork of Gogs). Please refer to this assessment for details. At the time of writing, no mitigation has been implemented in Gogs. So, it is highly recommended to set the DISABLE_GIT_HOOKS configuration setting to true to completely disable this feature and prevent all users (including admin) from creating custom Git hooks. It is a serious security risk.

Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 3