-
Notifications
You must be signed in to change notification settings - Fork 5.1k
Closed
Labels
💊 bugSomething isn't workingSomething isn't working🔒 securityCategorizes as related to securityCategorizes as related to security
Milestone
Description
Describe the bug
Stored Cross-Site Scripting (XSS) in the select assignee component | Mend
Additional context
Hi team, following your security policy request for sharing high-level vulnerability information, you can find it below.
Full report sent in mail to security@gogs.io.
In Gogs, versions v0.6.5 through v0.12.10 are vulnerable to Stored Cross-Site Scripting (XSS) that leads to an account takeover, in the select assignee component. When an admin selects an assignee from the user’s list, the malicious JavaScript payload in the first name executes that allows an attacker to gain admin privileges.
Contact: vulnerability@mend.io or daniel.elkabes@mend.io
Metadata
Metadata
Assignees
Labels
💊 bugSomething isn't workingSomething isn't working🔒 securityCategorizes as related to securityCategorizes as related to security