Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in code.gitea.io/gitea: GHSA-3h6c-c475-jm7v #2745

Closed
GoVulnBot opened this issue Apr 22, 2024 · 1 comment
Closed

Comments

@GoVulnBot
Copy link

In GitHub Security Advisory GHSA-3h6c-c475-jm7v, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
code.gitea.io/gitea 1.12.6 >= 1.1.0, < 1.12.6

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
    - module: code.gitea.io/gitea
      versions:
        - introduced: 1.1.0
          fixed: 1.12.6
      vulnerable_at: 1.12.5
      packages:
        - package: code.gitea.io/gitea
summary: Arbitrary Code Execution in Gitea in code.gitea.io/gitea
cves:
    - CVE-2020-14144
ghsas:
    - GHSA-3h6c-c475-jm7v
references:
    - web: https://nvd.nist.gov/vuln/detail/CVE-2020-14144
    - fix: https://github.com/go-gitea/gitea/pull/13058
    - fix: https://github.com/go-gitea/gitea/commit/8fe8ab5cbf2977f3a01ea12361df2cd76dce3ea9
    - web: https://docs.github.com/en/enterprise-server@2.19/admin/policies/creating-a-pre-receive-hook-script
    - web: https://docs.github.com/en/enterprise-server@2.19/admin/policies/creating-a-pre-receive-hook-script
    - web: https://docs.gitlab.com/ee/administration/server_hooks.html
    - web: https://github.com/PandatiX/CVE-2021-28378
    - web: https://github.com/PandatiX/CVE-2021-28378#notes
    - web: https://github.com/go-gitea/gitea/releases
    - web: https://podalirius.net/articles/exploiting-cve-2020-14144-gitea-authenticated-remote-code-execution
    - web: https://www.exploit-db.com/exploits/49571
    - web: https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-3-schwachstelle-in-gitea-1125-und-gogs-0122-ermoeglicht-ausfuehrung-von-code-nach-authent
    - web: http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html
    - advisory: https://github.com/advisories/GHSA-3h6c-c475-jm7v
source:
    id: GHSA-3h6c-c475-jm7v

@tatianab
Copy link
Contributor

Duplicate of #2276

@tatianab tatianab marked this as a duplicate of #2276 Apr 25, 2024
# for free to join this conversation on GitHub. Already have an account? # to comment
Projects
None yet
Development

No branches or pull requests

2 participants