Critical Unpatched Flaws Disclosed in Popular Gogs Open-Source Git Service
Jul 08, 2024
Vulnerability / Software Security
 Four unpatched security flaws, including three critical ones, have been disclosed in the Gogs  open-source, self-hosted Git service that could enable an authenticated attacker to breach susceptible instances, steal or wipe source code, and even plant backdoors.  The vulnerabilities, according to SonarSource researchers Thomas Chauchefoin and Paul Gerste, are listed below -   CVE-2024-39930  (CVSS score: 9.9) - Argument injection in the built-in SSH server  CVE-2024-39931  (CVSS score: 9.9) - Deletion of internal files  CVE-2024-39932  (CVSS score: 9.9) - Argument injection during changes preview  CVE-2024-39933  (CVSS score: 7.7) - Argument injection when tagging new releases   Successful exploitation of the first three shortcomings could permit an attacker to execute arbitrary commands on the Gogs server, while the fourth flaw allows attackers to read arbitrary files such as source code, and configuration secrets.   In other words, by abusing the issues, a threat actor could read sou...