CVE-2025-50978
- EPSS 0.04%
- Veröffentlicht 27.08.2025 00:00:00
- Zuletzt bearbeitet 09.09.2025 18:52:53
In Gitblit v1.7.1, a reflected cross-site scripting (XSS) vulnerability exists in the way repository path names are handled. By injecting a specially crafted path payload an attacker can cause arbitrary JavaScript to execute when a victim views the m...
CVE-2025-50977
- EPSS 0.04%
- Veröffentlicht 27.08.2025 00:00:00
- Zuletzt bearbeitet 09.09.2025 18:45:26
A template injection vulnerability leading to reflected cross-site scripting (XSS) has been identified in version 1.7.1, requiring authenticated admin access for exploitation. The vulnerability exists in the 'r' parameter and allows attackers to inje...
CVE-2022-31267
- EPSS 0.67%
- Veröffentlicht 21.05.2022 21:15:52
- Zuletzt bearbeitet 21.11.2024 07:04:15
Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext 'attacker@example.com\n\trole = "#admin"' value.
CVE-2022-31268
- EPSS 90.04%
- Veröffentlicht 21.05.2022 21:15:52
- Zuletzt bearbeitet 21.11.2024 07:04:15
A Path Traversal vulnerability in Gitblit 1.9.3 can lead to reading website files via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname).