CVE-2020-15867
HIGH NUCLEIGogs < 0.12.2 - Remote Code Execution
Title source: ruleDescription
The git hook feature in Gogs 0.5.5 through 0.12.2 allows for authenticated remote code execution. There can be a privilege escalation if access to this hook feature is granted to a user who does not have administrative privileges. NOTE: because this is mentioned in the documentation but not in the UI, it could be considered a "Product UI does not Warn User of Unsafe Actions" issue.
Exploits (1)
metasploit
WORKING POC
EXCELLENT
by Podalirius, Christophe De La Fuente · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/gogs_git_hooks_rce.rb
Nuclei Templates (1)
Gogs 0.5.5 - 0.12.2 - Remote Code Execution
HIGHVERIFIEDby theamanrawat
Shodan:
cpe:"cpe:2.3:a:gogs:gogs" || http.title:"sign in - gogs"
FOFA:
title="sign in - gogs"
References (2)
Scores
CVSS v3
7.2
EPSS
0.9176
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Details
Status
published
Products (1)
gogs/gogs
0.5.5 - 0.12.2
Published
Oct 16, 2020
Tracked Since
Feb 18, 2026