Skip to content

Improper Access Control in Gitea

Critical severity GitHub Reviewed Published Apr 24, 2024 to the GitHub Advisory Database • Updated Apr 24, 2024

Package

gomod github.com/go-gitea/gitea (Go)

Affected versions

>= 0.9.99, < 1.12.6

Patched versions

1.12.6

Description

Gitea 0.9.99 through 1.12.x before 1.12.6 does not prevent a git protocol path that specifies a TCP port number and also contains newlines (with URL encoding) in ParseRemoteAddr in modules/auth/repo_form.go.

References

Published to the GitHub Advisory Database Apr 24, 2024
Reviewed Apr 24, 2024
Last updated Apr 24, 2024

Severity

Critical
9.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2020-28991

GHSA ID

GHSA-r7h7-chh4-5rvm

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.