Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.
References
Link | Resource |
---|---|
https://github.com/gogs/gogs/commit/77a4a945ae9a87f77e392e9066b560edb71b5de9 | Patch |
https://github.com/gogs/gogs/releases/tag/v0.13.3 | Release Notes |
https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7 | Vendor Advisory Patch |
Configurations
History
21 Aug 2025, 20:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* | |
First Time |
Gogs
Gogs gogs |
|
References | () https://github.com/gogs/gogs/commit/77a4a945ae9a87f77e392e9066b560edb71b5de9 - Patch | |
References | () https://github.com/gogs/gogs/releases/tag/v0.13.3 - Release Notes | |
References | () https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7 - Vendor Advisory, Patch |
26 Jun 2025, 18:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Jun 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-24 04:15
Updated : 2025-08-21 20:43
NVD link : CVE-2024-56731
Mitre link : CVE-2024-56731
CVE.ORG link : CVE-2024-56731
JSON object : View
Products Affected
gogs
- gogs
CWE
CWE-552
Files or Directories Accessible to External Parties