First published: Thu Jul 18 2019(Updated: )
Gitea 1.7.0 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Attacker is able to have victim execute arbitrary JS in browser. The component is: go-get URL generation - PR to fix: https://github.com/go-gitea/gitea/pull/5905. The attack vector is: victim must open a specifically crafted URL. The fixed version is: 1.7.1 and later.
Credit: josh@bress.net josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
go/code.gitea.io/gitea | <=1.7.0 | 1.7.1 |
Gitea Gitea | <=1.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-1010261.
The severity of CVE-2019-1010261 is medium.
The impact of CVE-2019-1010261 is that an attacker is able to have a victim execute arbitrary JavaScript in the browser.
To fix CVE-2019-1010261, update Gitea to version 1.7.1 or later.
You can find more information about CVE-2019-1010261 on the NIST website and the GitHub security advisories.