CVE-2024-39930

CRITICAL

Gogs < 0.13.0 - Remote Code Execution

Title source: rule

Description

The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.

Exploits (5)

exploitdb WORKING POC
by cybersploit · pythonremotemultiple
https://www.exploit-db.com/exploits/52348
github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2024/CVE-2024-39930
nomisec WORKING POC
by laachy · poc
https://github.com/laachy/CVE-2024-39930-ptrace-detection-mitigation
nomisec WORKING POC
by alexander47777 · poc
https://github.com/alexander47777/-CVE-2024-39930
nomisec WORKING POC
by theMcSam · poc
https://github.com/theMcSam/CVE-2024-39930-PoC

Scores

CVSS v3 9.9
EPSS 0.1188
EPSS Percentile 93.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Details

CWE
CWE-88
Status published
Products (2)
gogs/gogs < 0.13.0
gogs.io/gogs 0 - 0.13.1Go
Published Jul 04, 2024
Tracked Since Feb 18, 2026