We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56731

Gogs deletion of internal files allows remote command execution



Description

Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.

Reserved 2024-12-27 | Published 2025-06-24 | Updated 2025-06-24 | Assigner GitHub_M


CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-552: Files or Directories Accessible to External Parties

Product status

< 0.13.3
affected

References

github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7

github.com/...ommit/77a4a945ae9a87f77e392e9066b560edb71b5de9

github.com/gogs/gogs/releases/tag/v0.13.3

cve.org (CVE-2024-56731)

nvd.nist.gov (CVE-2024-56731)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-56731

Support options

Helpdesk Chat, Email, Knowledgebase