CVE-2020-15867

HIGH NUCLEI

Gogs < 0.12.2 - Remote Code Execution

Title source: rule

Description

The git hook feature in Gogs 0.5.5 through 0.12.2 allows for authenticated remote code execution. There can be a privilege escalation if access to this hook feature is granted to a user who does not have administrative privileges. NOTE: because this is mentioned in the documentation but not in the UI, it could be considered a "Product UI does not Warn User of Unsafe Actions" issue.

Exploits (1)

metasploit WORKING POC EXCELLENT
by Podalirius, Christophe De La Fuente · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/gogs_git_hooks_rce.rb

Nuclei Templates (1)

Gogs 0.5.5 - 0.12.2 - Remote Code Execution
HIGHVERIFIEDby theamanrawat
Shodan: cpe:"cpe:2.3:a:gogs:gogs" || http.title:"sign in - gogs"
FOFA: title="sign in - gogs"

Scores

CVSS v3 7.2
EPSS 0.9176
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

Status published
Products (1)
gogs/gogs 0.5.5 - 0.12.2
Published Oct 16, 2020
Tracked Since Feb 18, 2026