CVE-2020-14144 – Gitea Git Hooks Remote Code Execution
https://notcve.org/view.php?id=CVE-2020-14144
The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states "This is a functionality of the software that is limited to a very limited subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides. ** EN DISPUTA ** La funcionalidad git hook en Gitea versiones 1.1.0 hasta 1.12.5 podría permitir la ejecución de código remoto autenticado en entornos de clientes donde la documentación no fue entendida (por ejemplo, un punto de vista es que la peligrosidad de esta característica debería ser documentada inmediatamente encima de la línea ENABLE_GIT_HOOKS en el archivo de configuración). NOTA: El proveedor ha indicado que no se trata de una vulnerabilidad y afirma: "Se trata de una funcionalidad del software que se limita a un subconjunto muy limitado de cuentas". • https://github.com/p0dalirius/CVE-2020-14144-GiTea-git-hooks-rce http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html https://docs.github.com/en/enterprise-server%402.19/admin/policies/creating-a-pre-receive-hook-script https://docs.gitlab.com/ee/administration/server_hooks.html https://github.com/PandatiX/CVE-2021-28378 https://github.com/PandatiX/CVE-2021-28378#notes https://github.com/go-gitea/gitea/pull/13058 https://github.com/go-gitea/gitea/ • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2020-13246
https://notcve.org/view.php?id=CVE-2020-13246
An issue was discovered in Gitea through 1.11.5. An attacker can trigger a deadlock by initiating a transfer of a repository's ownership from one organization to another. Se detectó un problema en Gitea versiones hasta 1.11.5. Un atacante puede desencadenar un interbloqueo (deadlock) al iniciar una transferencia de una propiedad de repositorio de una organización a otra. • https://github.com/go-gitea/gitea/issues/10549 https://github.com/go-gitea/gitea/pull/11438 https://www.youtube.com/watch?v=DmVgADSVS88 • CWE-667: Improper Locking •
CVE-2019-1010261
https://notcve.org/view.php?id=CVE-2019-1010261
Gitea 1.7.0 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Attacker is able to have victim execute arbitrary JS in browser. The component is: go-get URL generation - PR to fix: https://github.com/go-gitea/gitea/pull/5905. The attack vector is: victim must open a specifically crafted URL. The fixed version is: 1.7.1 and later. • https://github.com/go-gitea/gitea/pull/5905 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2019-11576
https://notcve.org/view.php?id=CVE-2019-11576
Gitea before 1.8.0 allows 1FA for user accounts that have completed 2FA enrollment. If a user's credentials are known, then an attacker could send them to the API without requiring the 2FA one-time password. Gitea, versiones anteriores a 1.8.0, permite 1FA para las cuentas de usuario que han completado la inscripción 2FA. Si se conocen las credenciales de un usuario, entonces un atacante podría enviarlas a la API sin requerir la contraseña única de 2FA. • https://blog.gitea.io/2019/04/gitea-1.8.0-is-released https://github.com/go-gitea/gitea/pull/6674 • CWE-287: Improper Authentication •
CVE-2019-11229 – Gitea 1.7.5 - Remote Code Execution
https://notcve.org/view.php?id=CVE-2019-11229
models/repo_mirror.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 mishandles mirror repo URL settings, leading to remote code execution. Versiones anteriores a 1.7.6 y 1.8.x anteriores a 1.8-RC3 de models/repo_mirror.go en Gitea maneja mal la configuración de la URL del repositorio espejo, lo que podría producir a una ejecución remota de código. Gitea version 1.7.5 suffers from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/49383 http://packetstormsecurity.com/files/160833/Gitea-1.7.5-Remote-Code-Execution.html https://github.com/go-gitea/gitea/releases/tag/v1.7.6 https://github.com/go-gitea/gitea/releases/tag/v1.8.0-rc3 •