From 7dbf8977270fe2d6b0933029154efe45fe78a829 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 28 Mar 2023 16:45:01 -0400 Subject: [PATCH] Enhancement: cves/2022/CVE-2022-0415.yaml by md --- cves/2022/CVE-2022-0415.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2022/CVE-2022-0415.yaml b/cves/2022/CVE-2022-0415.yaml index 794a2aeb15..0bc8139dc2 100644 --- a/cves/2022/CVE-2022-0415.yaml +++ b/cves/2022/CVE-2022-0415.yaml @@ -5,7 +5,7 @@ info: author: theamanrawat severity: high description: | - Gogs before 0.12.6 is susceptible to remote command execution via the uploading repository file in GitHub repository gogs/gogs. + Gogs before 0.12.6 is susceptible to remote command execution via the uploading repository file in GitHub repository gogs/gogs. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. reference: - https://github.com/gogs/gogs/commit/0fef3c9082269e9a4e817274942a5d7c50617284 - https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902