There is no known practical impact other than it is just possible to manipulate CSRF cookie and XSS the malicious user self.
Invalid characters of CSRF tokens are stripped after reading cookie. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.
No need for workarounds.
N/A
If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6953.
| Software | From | Fixed in |
|---|---|---|
gogs.io/gogs
|
- | 0.12.8 |