7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.059 Low
EPSS
Percentile
92.3%
github.com/go-gitea/gitea is vulnerable to remote code execution. The vulnerability exists due to a lack of sanitization of the newPullRequest
function in the gitea_uploader.go
file allowing an attacker to inject maliciously crafted script into the system.
packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.html
packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.html
blog.gitea.io/2022/05/gitea-1.16.7-is-released/
github.com/advisories/GHSA-p5f9-c9j9-g8qx
github.com/go-gitea/gitea/commit/242f7f1a528af0b85ad0dd6fa88ed2d889b92385
github.com/go-gitea/gitea/pull/19487
github.com/go-gitea/gitea/pull/19490
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.059 Low
EPSS
Percentile
92.3%