Gitea before 1.16.7 does not escape git fetch remote.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
| http://packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
| https://blog.gitea.io/2022/05/gitea-1.16.7-is-released/ | Release Notes Vendor Advisory |
| https://github.com/go-gitea/gitea/pull/19487 | Patch Third Party Advisory |
| https://github.com/go-gitea/gitea/pull/19490 | Patch Third Party Advisory |
| http://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
| http://packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
| https://blog.gitea.io/2022/05/gitea-1.16.7-is-released/ | Release Notes Vendor Advisory |
| https://github.com/go-gitea/gitea/pull/19487 | Patch Third Party Advisory |
| https://github.com/go-gitea/gitea/pull/19490 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 07:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
| References | () http://packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://blog.gitea.io/2022/05/gitea-1.16.7-is-released/ - Release Notes, Vendor Advisory | |
| References | () https://github.com/go-gitea/gitea/pull/19487 - Patch, Third Party Advisory | |
| References | () https://github.com/go-gitea/gitea/pull/19490 - Patch, Third Party Advisory |
27 Oct 2022, 16:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) http://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry |
15 Sep 2022, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
24 May 2022, 19:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://github.com/go-gitea/gitea/pull/19490 - Patch, Third Party Advisory | |
| References | (MISC) https://github.com/go-gitea/gitea/pull/19487 - Patch, Third Party Advisory | |
| References | (MISC) https://blog.gitea.io/2022/05/gitea-1.16.7-is-released/ - Release Notes, Vendor Advisory | |
| CWE | CWE-116 | |
| CPE | cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
16 May 2022, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | Gitea before 1.16.7 does not escape git fetch remote. |
16 May 2022, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-05-16 04:15
Updated : 2024-11-21 07:03
NVD link : CVE-2022-30781
Mitre link : CVE-2022-30781
CVE.ORG link : CVE-2022-30781
JSON object : View
Products Affected
gitea
- gitea
CWE
CWE-116
Improper Encoding or Escaping of Output
