
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site scripting (XSS) vulnerability was discovered in Gogs, affecting versions prior to 0.12.8. The vulnerability (GHSA-pj96-4jhv-v792) was published on May 31, 2022, and involves the manipulation of CSRF cookies. The issue was identified in the gogs.io/gogs Go package and was classified as a low severity security concern (GitHub Advisory).
The vulnerability is categorized under CWE-79 (Cross-site Scripting) and allows for the manipulation of CSRF tokens through cookies. The issue was discovered in the cookie handling mechanism of Gogs, where invalid characters in CSRF tokens were not properly stripped after reading from cookies (GitHub Advisory).
According to the official advisory, there is no known practical impact beyond the possibility of a malicious user performing XSS attacks against themselves through CSRF cookie manipulation (GitHub Advisory).
The vulnerability has been patched in version 0.12.8, which implements proper stripping of invalid characters from CSRF tokens after reading cookies. Users are advised to upgrade to either version 0.12.8 or the latest 0.13.0+dev. No specific workarounds are necessary if the patch is applied (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."