Cross-site scripting (XSS) vulnerability in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.8 allows remote attackers to inject arbitrary web script or HTML via the text parameter to api/v1/markdown.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://gogs.io/docs/intro/change_log.html - | |
References | () http://packetstormsecurity.com/files/129118/Gogs-Markdown-Renderer-Cross-Site-Scripting.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Nov/34 - Exploit | |
References | () http://www.securityfocus.com/archive/1/533996/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/98693 - |
Information
Published : 2014-11-21 15:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-8683
Mitre link : CVE-2014-8683
CVE.ORG link : CVE-2014-8683
JSON object : View
Products Affected
gogits
- gogs
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')