Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in code.gitea.io/gitea: GHSA-hqx2-j33x-9fc4 #2772

Closed
GoVulnBot opened this issue Apr 24, 2024 · 2 comments
Closed

Comments

@GoVulnBot
Copy link

In GitHub Security Advisory GHSA-hqx2-j33x-9fc4, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
code.gitea.io/gitea 1.7.4 >= 1.7.2, < 1.7.4

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
    - module: code.gitea.io/gitea
      versions:
        - introduced: 1.7.2
          fixed: 1.7.4
      vulnerable_at: 1.7.3
      packages:
        - package: code.gitea.io/gitea
summary: Gitea XSS Vulnerability in Repository Description in code.gitea.io/gitea
cves:
    - CVE-2019-1010314
ghsas:
    - GHSA-hqx2-j33x-9fc4
references:
    - web: https://nvd.nist.gov/vuln/detail/CVE-2019-1010314
    - report: https://github.com/go-gitea/gitea/issues/8717
    - fix: https://github.com/go-gitea/gitea/pull/6306
    - fix: https://github.com/go-gitea/gitea/pull/6308
    - fix: https://github.com/go-gitea/gitea/commit/c7bbfd8f5eb097c6910e142415fcdf48fc3c9814
    - web: https://github.com/go-gitea/gitea/releases/tag/v1.7.4
    - advisory: https://github.com/advisories/GHSA-hqx2-j33x-9fc4
source:
    id: GHSA-hqx2-j33x-9fc4

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/582535 mentions this issue: data/reports: batch add unreviewed reports

@tatianab
Copy link
Contributor

Duplicate of #2222

@tatianab tatianab marked this as a duplicate of #2222 Apr 30, 2024
# for free to join this conversation on GitHub. Already have an account? # to comment
Projects
None yet
Development

No branches or pull requests

3 participants