Miggo Logo

CVE-2014-8682: SQL Injection in Gogs

7.3

CVSS Score
3.1

Basic Information

EPSS Score
0.98313%
Published
6/29/2021
Updated
1/9/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
gogs.io/gogsgo>= 0.3.1, < 0.5.80.5.8

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff shows both functions were patched by replacing string concatenation ('%'+opt.Keyword+'%') with parameterized queries ('?'). The vulnerability description explicitly references improper handling of the 'q' parameter in these files. Exploit PoCs demonstrate SQLi via these endpoints, and the CVE analysis confirms unsafe SQL construction in these functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Multipl* SQL inj**tion vuln*r**iliti*s in *o*s (*k* *o *it S*rvi**) *.*.*-* t*rou** *.*.x ***or* *.*.*.**** **t* *llow r*mot* *tt**k*rs to *x**ut* *r*itr*ry SQL *omm*n*s vi* t** q p*r*m*t*r to (*) *pi/v*/r*pos/s**r**, w*i** is not prop*rly **n*l** in

Reasoning

T** *ommit *i** s*ows *ot* `*un*tions` w*r* p*t**** *y r*pl**in* strin* *on**t*n*tion ('%'+opt.K*ywor*+'%') wit* p*r*m*t*riz** qu*ri*s ('?'). T** vuln*r**ility **s*ription *xpli*itly r***r*n**s improp*r **n*lin* o* t** 'q' p*r*m*t*r in t**s* `*il*s`.