Gitea 漏洞列表
共找到 11 个与 Gitea 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2020-14144: Gitea 1.1.0 - 1.12.5 - Remote Code Execution POC
Gitea 1.1.0 through 1.12.5 is susceptible to authenticated remote code execution, via the git hook functionality, in customer environments where the documentation is not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states "This is a functionality of the software that is limited to a subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides." -
CVE-2022-1058: Gitea <1.16.5 - Open Redirect POC
Gitea before 1.16.5 is susceptible to open redirect via GitHub repository go-gitea/gitea. An attacker can redirect a user to a malicious site and potentially obtain sensitive information, modify data, and/or execute unauthorized operations. -
CVE-2024-6886: Gitea 1.22.0 - Cross-Site Scripting POC
Gitea 1.22.0 is vulnerable to a Stored Cross-Site Scripting (XSS) vulnerability. This vulnerability allows an attacker to inject malicious scripts that get stored on the server and executed in the context of another user's session. -
gitea-login-check: gitea.com Login Check POC
Checks for a valid gitea account. -
CVE-2020-14144: Gitea 1.1.0 - 1.12.5 - Remote Code Execution POC
Gitea 1.1.0 through 1.12.5 is susceptible to authenticated remote code execution, via the git hook functionality, in customer environments where the documentation is not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states "This is a functionality of the software that is limited to a subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides." -
CVE-2022-1058: Gitea <1.16.5 - Open Redirect POC
Gitea before 1.16.5 is susceptible to open redirect via GitHub repository go-gitea/gitea. An attacker can redirect a user to a malicious site and potentially obtain sensitive information, modify data, and/or execute unauthorized operations. -
CVE-2024-6886: Gitea 1.22.0 - Cross-Site Scripting POC
Gitea 1.22.0 is vulnerable to a Stored Cross-Site Scripting (XSS) vulnerability. This vulnerability allows an attacker to inject malicious scripts that get stored on the server and executed in the context of another user's session. -
gitea-public-signup: Gitea Public Registration Enabled POC
A misconfiguration in Gitea allows arbitrary users to sign up and read code hosted on the service. -
gitea-installer: Gitea Installer Exposure POC
Gitea is susceptible to the Installation page exposure due to misconfiguration. -
gitea-rce: Gitea 1.4.0 - Remote Code Execution POC
Gitea 1.4.0 is vulnerable to remote code execution. -
Gitea 弱口令漏洞 无POC
弱口令漏洞指的是系统中使用了简单、容易猜测或常见的密码,导致攻击者可以通过猜测或暴力破解的方式轻易获取账户权限,进而访问或控制受影响的系统资源。这种漏洞通常由于缺乏有效的密码策略或用户对安全意识的忽视造成。