CVE-2014-8682

Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gogits:gogs:*:*:*:*:*:*:*:*
cpe:2.3:a:gogits:gogs:0.3.1-9:*:*:*:*:*:*:*
cpe:2.3:a:gogits:gogs:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:gogits:gogs:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:gogits:gogs:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:gogits:gogs:0.5.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-11-21 15:59

Updated : 2024-02-04 18:35


NVD link : CVE-2014-8682

Mitre link : CVE-2014-8682

CVE.ORG link : CVE-2014-8682


JSON object : View

Products Affected

gogits

  • gogs
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')