Skip to content

Open Redirect

Moderate severity GitHub Reviewed Published Jun 29, 2021 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

gomod gogs.io/gogs (Go)

Affected versions

< 0.12.0

Patched versions

0.12.0

Description

Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go.

References

Reviewed May 20, 2021
Published to the GitHub Advisory Database Jun 29, 2021
Last updated Jan 9, 2023

Severity

Moderate
6.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2018-15178

GHSA ID

GHSA-cpgw-2wxr-pww3

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.