Affected by GO-2022-0369
and 20 other vulnerabilities
GO-2022-0369: Gogs vulnerable to improper PAM authorization handling in gogs.io/gogs
GO-2022-0473: Cross site scripting via cookies in gogs in gogs.io/gogs
GO-2022-0483: Cross-site Scripting vulnerability in repository issue list in Gogs in gogs.io/gogs
GO-2022-0554: Unrestricted Upload of File with Dangerous Type in Gogs in gogs.io/gogs
GO-2022-0556: OS Command Injection in file editor in Gogs in gogs.io/gogs
GO-2022-0562: Path Traversal in Git HTTP endpoints in Gogs in gogs.io/gogs
GO-2022-0570: Path Traversal in file editor on Windows in Gogs in gogs.io/gogs
GO-2022-0583: Server-Side Request Forgery in gogs webhook in gogs.io/gogs
GO-2023-1596: Gogs OS Command Injection vulnerability in gogs.io/gogs
GO-2023-1971: Gogs and Gitea SSRF Vulnerability in code.gitea.io/gitea
package
Version:
v0.4.1
Opens a new window with list of versions in this module.
Published: Jun 1, 2014
License: BSD-3-Clause
Opens a new window with license information.
Imports: 4
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
AddHookTask adds new hook task to task queue.
HookTask represents hook task.
Payload represents payload information of hook.
type PayloadAuthor struct {
Name string `json:"name"`
Email string `json:"email"`
}
type PayloadRepo struct {
Id int64 `json:"id"`
Name string `json:"name"`
Url string `json:"url"`
Description string `json:"description"`
Website string `json:"website"`
Watchers int `json:"watchers"`
Owner *PayloadAuthor `json:"author"`
Private bool `json:"private"`
}
Source Files
¶
Click to show internal directories.
Click to hide internal directories.