CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-39931

Medium Severity
SVRS
36/100

CVSSv3
NA/10

EPSS
0.00179/1

CVE-2024-39931 in Gogs allows for the deletion of internal files, posing a risk to data integrity. This vulnerability, present in Gogs versions up to 0.13.0, could be exploited by malicious actors. Despite the low CVSS score of 0, the "In The Wild" tag indicates active exploitation. The SOCRadar Vulnerability Risk Score (SVRS) is 36, suggesting a moderate level of risk, although not critical it requires monitoring. Successful exploitation could lead to data loss or system instability. Mitigating this vulnerability is crucial to protect sensitive information. The ability to delete internal files can compromise the overall security and functionality of Gogs.

In The Wild
2024-07-04

2024-07-09
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-39931 is a vulnerability in Gogs, a self-hosted Git service. The vulnerability allows an attacker to delete internal files, which could lead to a compromise of the server. The CVSS score for this vulnerability is 9.9, indicating that it is a critical vulnerability. However, the SOCRadar Vulnerability Risk Score (SVRS) for this vulnerability is only 38, indicating that it is not as severe as the CVSS score would suggest. This is because the SVRS takes into account a wider range of factors than the CVSS, including social media, news, code repositories, dark/deep web data, and associations with threat actors and malware.

Key Insights

  • This vulnerability is critical and could lead to a compromise of the server.
  • The SVRS for this vulnerability is lower than the CVSS score, indicating that it is not as severe as the CVSS score would suggest.
  • This vulnerability is not currently being actively exploited by hackers.
  • CISA has not issued a warning about this vulnerability.

Mitigation Strategies

  • Update Gogs to version 0.13.1 or later.
  • Restrict access to the Gogs server to only authorized users.
  • Monitor the Gogs server for suspicious activity.
  • Back up the Gogs server regularly.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-39931 | Gogs up to 0.13.0 Internal File file access (Nessus ID 234496)
vuldb.com2025-04-16
CVE-2024-39931 | Gogs up to 0.13.0 Internal File file access (Nessus ID 234496) | A vulnerability classified as problematic has been found in Gogs up to 0.13.0. This affects an unknown part of the component Internal File Handler. The manipulation leads to files or directories accessible. This vulnerability is uniquely identified as CVE-2024-39931. It is possible to initiate the attack remotely. There
vuldb.com
rss
forum
news
FOCUS FRIDAY: MANAGING THIRD-PARTY RISKS FROM DAHUA IP CAMERA, SONICWALL FIREWALL, AND WPML, FILECATALYST WORKFLOW VULNERABILITIES WITH BLACK KITE’S FOCUSTAGS™
Ferdi Gül2024-08-30
FOCUS FRIDAY: MANAGING THIRD-PARTY RISKS FROM DAHUA IP CAMERA, SONICWALL FIREWALL, AND WPML, FILECATALYST WORKFLOW VULNERABILITIES WITH BLACK KITE’S FOCUSTAGS™ | Written By: Ferdi GülContributor: Ferhat Dikbiyik Welcome to this week’s Focus Friday, where we dive into the latest high-profile cybersecurity incidents impacting third-party risk management (TPRM). In today’s blog, we explore critical vulnerabilities in Dahua IP Cameras, SonicWall Firewalls, WPML plugin for WordPress, and Fortra’s FileCatalyst Workflow. These vulnerabilities present significant risks to organizations relying [&#8230;] The post <a href="https://blackkite.com/blog/focus-friday-managing-third-party-risks-from-dahua-ip-camera-sonicwall-firewall-and-wpml-filecatalyst-workflow-vulnerabilities-with-black-kites-focustags/
cve-2024-39949
cve-2024-39948
cve-2024-39932
cve-2021-34473
FOCUS FRIDAY: TPRM INSIGHTS ON GOGS, INTERNET EXPLORER, DOCKER AUTHZ, AND JumpServer VULNERABILITIES
Ferdi Gül2024-07-26
FOCUS FRIDAY: TPRM INSIGHTS ON GOGS, INTERNET EXPLORER, DOCKER AUTHZ, AND JumpServer VULNERABILITIES | Written By: Ferdi GülContributor: Ferhat Dikbiyik Welcome to this week&#8217;s Focus Friday blog, where we delve into high-profile cybersecurity incidents with a critical eye on Third-Party Risk Management (TPRM). In this edition, we explore significant vulnerabilities impacting Gogs, Internet Explorer, Docker AuthZ, and JumpServer. Utilizing Black Kite&#8217;s FocusTags™, we provide you with actionable insights to [&#8230;] The post FOCUS FRIDAY: TPRM INSIGHTS ON GOGS, INTERNET
cve-2024-39929
cve-2012-4792
cve-2024-24919
cve-2024-39933
Vulnerability Recap 7/15/24 – Industry Patches vs Flaw Exploits
Maine Basan2024-07-15
Vulnerability Recap 7/15/24 – Industry Patches vs Flaw Exploits | Threat actors are on the rise again. Discover the recent vulnerabilities, patches, and updates for your systems. The post Vulnerability Recap 7/15/24 – Industry Patches vs Flaw Exploits appeared first on eSecurity Planet.Last week&#8217;s vulnerability news highlighted major flaws across industries, urging quick patch response. The majority of incidents involved malicious threat actors exploiting vulnerabilities in
esecurityplanet.com
rss
forum
news
CVE-2024-39931 | Gogs up to 0.13.0 Internal File file access
vuldb.com2024-07-10
CVE-2024-39931 | Gogs up to 0.13.0 Internal File file access | A vulnerability classified as problematic has been found in Gogs up to 0.13.0. This affects an unknown part of the component Internal File Handler. The manipulation leads to files or directories accessible. This vulnerability is uniquely identified as CVE-2024-39931. It is possible to initiate the attack remotely. There is no exploit
cve-2024-39931
domains
urls
cves
CVE-2024-39931 | Gogs up to 0.13.0 Internal File unknown vulnerability
vuldb.com2024-07-04
CVE-2024-39931 | Gogs up to 0.13.0 Internal File unknown vulnerability | A vulnerability classified as problematic has been found in Gogs up to 0.13.0. This affects an unknown part of the component Internal File Handler. The manipulation leads to an unknown weakness. This vulnerability is uniquely identified as CVE-2024-39931. It is possible to initiate the attack remotely. There is no exploit available
cve-2024-39931
domains
urls
cves

Social Media

🚨 4 critical #CVEs (CVE-2024-39930, CVE-2024-39931, CVE-2024-39932, CVE-2024-39933) in Gogs, which contains around 7300 instances facing the Internet. Issues allow command execution, source code modification, and more. Sonar released a patch, but no official release yet. #AppSec
0
0
1
CVE-2024-39931 Gogs through 0.13.0 allows deletion of internal files. https://t.co/lJBN4s6PDk
0
0
0
[CVE-2024-39931: CRITICAL] Gogs through 0.13.0 allows deletion of internal files.#cybersecurity,#vulnerability https://t.co/CBiq9kD7nc https://t.co/vlb4kTvHI8
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://github.com/gogs/gogs/releases
[email protected]https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/

CWE Details

CWE IDCWE NameDescription
CWE-552Files or Directories Accessible to External PartiesThe product makes files or directories accessible to unauthorized actors, even though they should not be.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence