Gitea

Gitea

53 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.42%
  • Veröffentlicht 24.11.2020 01:15:11
  • Zuletzt bearbeitet 21.11.2024 05:23:26

Gitea 0.9.99 through 1.12.x before 1.12.6 does not prevent a git protocol path that specifies a TCP port number and also contains newlines (with URL encoding) in ParseRemoteAddr in modules/auth/repo_form.go.

Exploit
  • EPSS 93.31%
  • Veröffentlicht 16.10.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:43

The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood (e.g., one viewpoint is that the dangerousness of this feature should be docume...

Exploit
  • EPSS 0.8%
  • Veröffentlicht 20.05.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:00:52

An issue was discovered in Gitea through 1.11.5. An attacker can trigger a deadlock by initiating a transfer of a repository's ownership from one organization to another.

  • EPSS 0.26%
  • Veröffentlicht 18.07.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:18:06

Gitea 1.7.0 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Attacker is able to have victim execute arbitrary JS in browser. The component is: go-get URL generation - PR to fix: https://github.com/go-gitea/gitea/pull/5905. The ...

  • EPSS 0.26%
  • Veröffentlicht 11.07.2019 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:09

Gitea 1.7.2, 1.7.3 is affected by: Cross Site Scripting (XSS). The impact is: execute JavaScript in victim's browser, when the vulnerable repo page is loaded. The component is: repository's description. The attack vector is: victim must navigate to p...

  • EPSS 0.82%
  • Veröffentlicht 31.05.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:18:54

Jenkins Gitea Plugin 1.1.1 and earlier did not implement trusted revisions, allowing attackers without commit access to the Git repo to change Jenkinsfiles even if Jenkins is configured to consider them to be untrusted.

  • EPSS 0.4%
  • Veröffentlicht 28.04.2019 02:29:00
  • Zuletzt bearbeitet 21.11.2024 04:21:22

Gitea before 1.8.0 allows 1FA for user accounts that have completed 2FA enrollment. If a user's credentials are known, then an attacker could send them to the API without requiring the 2FA one-time password.

Exploit
  • EPSS 27.25%
  • Veröffentlicht 15.04.2019 12:31:36
  • Zuletzt bearbeitet 21.11.2024 04:20:46

models/repo_mirror.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 mishandles mirror repo URL settings, leading to remote code execution.

  • EPSS 0.24%
  • Veröffentlicht 15.04.2019 12:31:36
  • Zuletzt bearbeitet 21.11.2024 04:20:46

repo/setting.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 does not validate the form.MirrorAddress before calling SaveAddress.

  • EPSS 0.29%
  • Veröffentlicht 04.02.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:17:39

Gitea version 1.6.2 and earlier contains a Incorrect Access Control vulnerability in Delete/Edit file functionallity that can result in the attacker deleting files outside the repository he/she has access to. This attack appears to be exploitable via...