Affected by GO-2022-0369
and 22 other vulnerabilities
GO-2022-0369: Gogs vulnerable to improper PAM authorization handling in gogs.io/gogs
GO-2022-0473: Cross site scripting via cookies in gogs in gogs.io/gogs
GO-2022-0483: Cross-site Scripting vulnerability in repository issue list in Gogs in gogs.io/gogs
GO-2022-0554: Unrestricted Upload of File with Dangerous Type in Gogs in gogs.io/gogs
GO-2022-0556: OS Command Injection in file editor in Gogs in gogs.io/gogs
GO-2022-0562: Path Traversal in Git HTTP endpoints in Gogs in gogs.io/gogs
GO-2022-0570: Path Traversal in file editor on Windows in Gogs in gogs.io/gogs
GO-2022-0583: Server-Side Request Forgery in gogs webhook in gogs.io/gogs
GO-2022-1060: Gogs vulnerable to Cross-site Scripting in gogs.io/gogs
GO-2023-1596: Gogs OS Command Injection vulnerability in gogs.io/gogs
GO-2023-1971: Gogs and Gitea SSRF Vulnerability in code.gitea.io/gitea
GO-2024-3275: Unpatched Remote Code Execution in Gogs in gogs.io/gogs
GO-2024-3355: Remote Command Execution in file editing in gogs in gogs.io/gogs
GO-2024-3356: Path Traversal in file update API in gogs in gogs.io/gogs
package
Version:
v0.6.5
Opens a new window with list of versions in this module.
Published: Aug 16, 2015
License: MIT
Opens a new window with license information.
Imports: 21
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
It is recommend to use this way
cacheDir := "./cache"
defaultImg := "./default.jpg"
http.Handle("/avatar/", avatar.CacheServer(cacheDir, defaultImg))
http.Handle("/avatar/", avatar.CacheServer("./cache"))
hash email to md5 string
keep this func in order to make this package independent
RandomImage generates and returns a random avatar image.
func UpdateGravatarSource()
Avatar represents the avatar object.
default image format: jpeg
get image from gravatar.com
type Thunder struct {
QueueSize int
}
Source Files
¶
Click to show internal directories.
Click to hide internal directories.