Page 5 of 29 results (0.008 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Gitea 1.7.0 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Attacker is able to have victim execute arbitrary JS in browser. The component is: go-get URL generation - PR to fix: https://github.com/go-gitea/gitea/pull/5905. The attack vector is: victim must open a specifically crafted URL. The fixed version is: 1.7.1 and later. • https://github.com/go-gitea/gitea/pull/5905 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins Gitea Plugin 1.1.1 and earlier did not implement trusted revisions, allowing attackers without commit access to the Git repo to change Jenkinsfiles even if Jenkins is configured to consider them to be untrusted. En Plugin Gitea de Jenkins versión 1.1.1 y anteriores, no fueron implementadas revisiones seguras, lo que permite a atacanter sin acceso comprometido al repositorio Git cambiar los archivos de Jenkins, inclusive si Jenkins se configuró para considerar que no son de confianza • http://www.openwall.com/lists/oss-security/2019/05/31/2 http://www.securityfocus.com/bid/108540 https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046 • CWE-862: Missing Authorization •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Gitea before 1.8.0 allows 1FA for user accounts that have completed 2FA enrollment. If a user's credentials are known, then an attacker could send them to the API without requiring the 2FA one-time password. Gitea, versiones anteriores a 1.8.0, permite 1FA para las cuentas de usuario que han completado la inscripción 2FA. Si se conocen las credenciales de un usuario, entonces un atacante podría enviarlas a la API sin requerir la contraseña única de 2FA. • https://blog.gitea.io/2019/04/gitea-1.8.0-is-released https://github.com/go-gitea/gitea/pull/6674 • CWE-287: Improper Authentication •

CVSS: 8.8EPSS: 4%CPEs: 3EXPL: 2

models/repo_mirror.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 mishandles mirror repo URL settings, leading to remote code execution. Versiones anteriores a 1.7.6 y 1.8.x anteriores a 1.8-RC3 de models/repo_mirror.go en Gitea maneja mal la configuración de la URL del repositorio espejo, lo que podría producir a una ejecución remota de código. Gitea version 1.7.5 suffers from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/49383 http://packetstormsecurity.com/files/160833/Gitea-1.7.5-Remote-Code-Execution.html https://github.com/go-gitea/gitea/releases/tag/v1.7.6 https://github.com/go-gitea/gitea/releases/tag/v1.8.0-rc3 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

repo/setting.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 does not validate the form.MirrorAddress before calling SaveAddress. Versiones anteriores a 1.7.6 y 1.8.x anteriores a 1.8-RC3 de repo/setting.go en Gitea no validan form.MirrorAddress antes de invocar SaveAddress. • https://github.com/go-gitea/gitea/releases/tag/v1.7.6 https://github.com/go-gitea/gitea/releases/tag/v1.8.0-rc3 • CWE-20: Improper Input Validation •