Hackers Breach 700 Servers via Unpatched Gogs Zero-Day Vulnerability

by Anika Shah - Technology
0 comments

“`html





<a href="https://www.archynewsy.com/zintis-zvarts-saksofonists-un-pedagogs-kas-apvieno-lielako-dalu-no-pasauleatrodiet-iespaidigu-cesu-saksofonistu-zinti-zvartu-kurs-ir-guvis-atzinibu-ne-tikai-latvija-bet-ari-pasaule-recejot-apjam/" title="<p><strong>Zintis Žvarts: Saksofonists un Peda...gs, Kas Apvieno Lielāko Daļu No Pasaulē</strong></p> <p>Atrodiet iespaidīgū Cēsu saksofonistu Zinti Žvartu, kurš ir guvis atzinību ne tikai Latvijā, bet arī pasaulē, recējot apjamo daudzpusīgu mūzikas karjeru no koncertiem līdz peda...ģijai. Uzziniet par viņa koncertveikalā Itālijā, Japānā, un citās daudzās valstīs, kā arī par viņa mācību darbu Alfrēda Kalniņa Cēsu Mūzikas vidusskolā. Uzziniet par Zinta pilsētas redzējumu, kā atšķirīgi ir klausītāji dažādos pasaules reģionos, un kā viņš balso par mūzikas reālībām un perspektīvām. Cik daudz mākslinieciskās gūšanas ir ieguvušana, mijiedarbība ar talantīgiem mūziķiem un fascinējoša dzīvesiet gardaisnis. Paziņojiet, kā Zintis balso par dabiskumu un vērtību veidošanu Cēsīs muzikālajā vidē.</p>">Gogs</a> Zero-Day Vulnerability Enables Remote Code Execution


Gogs Zero-Day Vulnerability Enables Remote Code Execution

An unpatched zero-day vulnerability in Gogs, a popular self-hosted Git service, has enabled attackers to gain remote code execution on internet-facing instances and compromise hundreds of servers.

What is Gogs and Why is This Vulnerability Notable?

Written in Go and designed as an alternative to GitLab or GitHub Enterprise, Gogs is often chosen for its lightweight nature and ease of self-hosting. It’s also frequently exposed online for remote collaboration. This accessibility, while convenient, makes it a prime target for attackers when vulnerabilities exist. The ability to achieve remote code execution (RCE) is particularly dangerous becuase it allows an attacker to completely control the compromised server.

Understanding CVE-2025-8110: The Path Traversal Flaw

CVE-2025-8110, the Gogs RCE vulnerability exploited in these attacks, stems from a path traversal weakness in the PutContents API. A path traversal vulnerability occurs when an application allows a user to access files and directories that are located outside the web server’s root directory. In simpler terms, it’s like giving someone a key that unlocks doors thay shouldn’t have access to.

This flaw allows threat actors to bypass the protections implemented for a previously patched remote code execution bug (CVE-2024-55947) by using symbolic links to overwrite files outside the repository. Let’s break that down:

  • Symbolic Links: These are essentially shortcuts to other files or directories. They allow you to access a file as if it where in a different location.
  • Bypassing Previous Patches: Gogs developers previously addressed a similar RCE vulnerability (CVE-2024-55947). the current vulnerability circumvents those protections.
  • Overwriting Files: Attackers are exploiting the flaw to write malicious code to files outside the intended repository directory, effectively gaining control of the server.

How the Vulnerability Works: A deeper Dive

While Gogs versions that addressed the CVE-2024-55947 security bug now validate path names to prevent directory traversal, they still fail to validate the destination of symbolic links. Attackers can abuse this by creating a symbolic link that points to a sensitive system file.When the PutContents API processes this link, it overwrites the target file with malicious code. This is a critical oversight because it allows attackers to bypass the intended security measures.

Why is Symbolic Link Validation Important?

Validating symbolic links is crucial because it prevents attackers from using them to redirect file operations to unintended locations. Without this validation, an attacker can essentially trick the application into writing to any file on the server that the application’s user has permission to access.This is a common security best practice.

Impact and Mitigation

The impact of this vulnerability is severe. Successful exploitation leads to remote code execution, allowing attackers to:

  • Steal sensitive Data: Access and exfiltrate confidential data stored on the server.
  • Deploy Malware: Install malicious software, such as ransomware or backdoors.
  • Compromise the Entire network: Use the compromised server as a stepping stone to attack other systems on the network.

Mitigation: The primary mitigation is to instantly update to a patched version of Gogs. As of this writing, the specific patched version should be obtained from the official Gogs project resources. If updating is not immediately possible, consider temporarily taking the Gogs instance offline to prevent exploitation.

Key Takeaways

  • A zero-day RCE vulnerability (CVE-2025-8110) exists in Gogs.
  • The vulnerability is due to a path traversal flaw related to symbolic links.
  • Attackers can exploit this flaw

Related Posts

Leave a Comment