CVE-2024-39930
CRITICALGogs < 0.13.0 - Remote Code Execution
Title source: ruleDescription
The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
Exploits (5)
exploitdb
WORKING POC
by cybersploit · pythonremotemultiple
https://www.exploit-db.com/exploits/52348
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2024/CVE-2024-39930
nomisec
WORKING POC
by laachy · poc
https://github.com/laachy/CVE-2024-39930-ptrace-detection-mitigation
References (3)
Scores
CVSS v3
9.9
EPSS
0.1188
EPSS Percentile
93.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-88
Status
published
Products (2)
gogs/gogs
< 0.13.0
gogs.io/gogs
0 - 0.13.1Go
Published
Jul 04, 2024
Tracked Since
Feb 18, 2026