Duplicate Advisory: Improper Authorization in Gogs
High severity
GitHub Reviewed
Published
Mar 12, 2022
to the GitHub Advisory Database
•
Updated Jun 30, 2023
Withdrawn
This advisory was withdrawn on Jun 30, 2023
Description
Published by the National Vulnerability Database
Mar 11, 2022
Published to the GitHub Advisory Database
Mar 12, 2022
Reviewed
Mar 14, 2022
Withdrawn
Jun 30, 2023
Last updated
Jun 30, 2023
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-gw5h-h6hj-f56g. This link is maintained to preserve external references.
Original Description
Impact
Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as authentication sources are affected.
Patches
Expired PAM accounts and accounts with expired passwords are no longer being seen as valid. Users should upgrade to 0.12.5 or the latest 0.13.0+dev.
Workarounds
In addition to marking PAM accounts as expired, also disable/lock them. Running
usermod -L <username>
will add an exclamation mark to the password hash and would result in wrong passwords responses when trying to login.References
https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62/
For more information
If you have any questions or comments about this advisory, please post on gogs/gogs#6810.
References