Miggo Logo

CVE-2022-2024: Gogs OS Command Injection vulnerability

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.97388%
Published
2/28/2023
Updated
3/9/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
gogs.io/gogsgo< 0.12.110.12.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient case-insensitive validation in path checks for .git directory protection. The patch adds strings.ToLower(path) normalization, confirming the original function's case-sensitive implementation was the flaw. This function was responsible for preventing writes to .git directories, and its case-sensitive check failed to block alternate casing variants on case-insensitive filesystems.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** m*li*ious us*r is **l* to up**t* * *r**t** `*on*i*` *il* into r*pository's `.*it` *ir**tory in *om*in*tion wit* *r**t** *il* **l*tion to **in SS* ****ss to t** s*rv*r on **s*-ins*nsitiv* *il* syst*ms. *ll inst*ll*tions wit* [r*positor

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt **s*-ins*nsitiv* `v*li**tion` in p*t* ****ks *or `.*it` *ir**tory prot**tion. T** p*t** ***s `strin*s.ToLow*r(p*t*)` norm*liz*tion, *on*irmin* t** ori*in*l *un*tion's **s*-s*nsitiv* impl*m*nt*tion w*s t** *l*