First published: Sun Apr 28 2019(Updated: )
Gitea before 1.8.0 allows 1FA for user accounts that have completed 2FA enrollment. If a user's credentials are known, then an attacker could send them to the API without requiring the 2FA one-time password.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gitea Gitea | <1.8.0 | |
go/code.gitea.io/gitea | <1.8.0 | 1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11576 is a vulnerability in Gitea before version 1.8.0 that allows 1FA for user accounts that have completed 2FA enrollment.
If a user's credentials are known, an attacker could send them to the Gitea API without requiring the 2FA one-time password.
CVE-2019-11576 has a severity rating of 9.8 (Critical).
To fix CVE-2019-11576, upgrade Gitea to version 1.8.0 or newer.
You can find more information about CVE-2019-11576 in the following references: [Link 1](https://blog.gitea.io/2019/04/gitea-1.8.0-is-released/), [Link 2](https://github.com/go-gitea/gitea/pull/6674).