Page 5 of 31 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

An issue was discovered in Gitea through 1.11.5. An attacker can trigger a deadlock by initiating a transfer of a repository's ownership from one organization to another. Se detectó un problema en Gitea versiones hasta 1.11.5. Un atacante puede desencadenar un interbloqueo (deadlock) al iniciar una transferencia de una propiedad de repositorio de una organización a otra. • https://github.com/go-gitea/gitea/issues/10549 https://github.com/go-gitea/gitea/pull/11438 https://www.youtube.com/watch?v=DmVgADSVS88 • CWE-667: Improper Locking •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Gitea 1.7.0 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Attacker is able to have victim execute arbitrary JS in browser. The component is: go-get URL generation - PR to fix: https://github.com/go-gitea/gitea/pull/5905. The attack vector is: victim must open a specifically crafted URL. The fixed version is: 1.7.1 and later. • https://github.com/go-gitea/gitea/pull/5905 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

Gitea 1.7.2, 1.7.3 is affected by: Cross Site Scripting (XSS). The impact is: execute JavaScript in victim's browser, when the vulnerable repo page is loaded. The component is: repository's description. The attack vector is: victim must navigate to public and affected repo page. Gitea versiones 1.7.2, 1.7.3 está afectada por: Cross Site Scripting (XSS). • https://github.com/go-gitea/gitea/releases • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins Gitea Plugin 1.1.1 and earlier did not implement trusted revisions, allowing attackers without commit access to the Git repo to change Jenkinsfiles even if Jenkins is configured to consider them to be untrusted. En Plugin Gitea de Jenkins versión 1.1.1 y anteriores, no fueron implementadas revisiones seguras, lo que permite a atacanter sin acceso comprometido al repositorio Git cambiar los archivos de Jenkins, inclusive si Jenkins se configuró para considerar que no son de confianza • http://www.openwall.com/lists/oss-security/2019/05/31/2 http://www.securityfocus.com/bid/108540 https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046 • CWE-862: Missing Authorization •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Gitea before 1.8.0 allows 1FA for user accounts that have completed 2FA enrollment. If a user's credentials are known, then an attacker could send them to the API without requiring the 2FA one-time password. Gitea, versiones anteriores a 1.8.0, permite 1FA para las cuentas de usuario que han completado la inscripción 2FA. Si se conocen las credenciales de un usuario, entonces un atacante podría enviarlas a la API sin requerir la contraseña única de 2FA. • https://blog.gitea.io/2019/04/gitea-1.8.0-is-released https://github.com/go-gitea/gitea/pull/6674 • CWE-287: Improper Authentication •