First published: Sun Nov 04 2018(Updated: )
Gitea before 1.5.4 allows remote code execution because it does not properly validate session IDs. This is related to session ID handling in the go-macaron/session code for Macaron.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/code.gitea.io/gitea | <1.5.2 | 1.5.2 |
Gitea Gitea | <1.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18926 is a vulnerability in Gitea before version 1.5.4 that allows remote code execution due to improper validation of session IDs.
The severity of CVE-2018-18926 is critical, with a CVSS score of 9.8.
CVE-2018-18926 allows attackers to remotely execute code in Gitea instances that are using versions prior to 1.5.4.
To fix CVE-2018-18926, you should update Gitea to version 1.5.4 or later, which includes the necessary fixes for proper validation of session IDs.
You can find more information about CVE-2018-18926 in the NVD database and the GitHub issues and pull requests related to Gitea.