
Cloud Vulnerability DB
A community-led vulnerabilities database
Gogs through version 0.11.91 contains a race condition vulnerability in the internal/db/repo.go file that allows attackers to bypass the administrator-specified repository creation policy. The vulnerability was discovered and disclosed on February 21, 2020 (NVD).
The vulnerability stems from a race condition in the NumRepos field update process, which is not handled in a thread-safe manner. The issue occurs because the row is not locked during repository creation checks, allowing multiple concurrent requests to bypass the MaxCreationLimit restriction. The vulnerability has been assigned a CVSS v3.1 base score of 5.9 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N (NVD, GitHub Issue).
When exploited, this vulnerability allows attackers to create more repositories than the administrator-specified limit, potentially leading to resource exhaustion and violation of organizational policies (GitHub Issue).
The suggested solutions include implementing optimistic locking for the NumRepos field in the User struct or redesigning the system to count repositories directly from the repository table instead of maintaining a counter in the user table (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."