7.2
CWE
78
Advisory Published
Advisory Published
Updated

CVE-2020-14144: OS Command Injection

First published: Fri Oct 16 2020(Updated: )

** DISPUTED ** The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states "This is a functionality of the software that is limited to a very limited subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides."

Credit: cve@mitre.org cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Gitea Gitea>=1.1.0<=1.12.5
go/code.gitea.io/gitea>=1.1.0<1.12.6
1.12.6
>=1.1.0<=1.12.5

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-14144?

    CVE-2020-14144 is a vulnerability found in the git hook feature in Gitea 1.1.0 through 1.12.5 that might allow for authenticated remote code execution.

  • What is the severity of CVE-2020-14144?

    The severity of CVE-2020-14144 is high with a CVSS score of 7.2.

  • How does CVE-2020-14144 affect Gitea?

    CVE-2020-14144 affects Gitea versions 1.1.0 through 1.12.5.

  • How can I fix CVE-2020-14144?

    To fix CVE-2020-14144, it is recommended to update Gitea to a version beyond 1.12.5 or apply any official patches or fixes provided by the Gitea team.

  • Where can I find more information about CVE-2020-14144?

    You can find more information about CVE-2020-14144 at the following references: [Reference 1](http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html), [Reference 2](https://docs.github.com/en/enterprise-server@2.19/admin/policies/creating-a-pre-receive-hook-script), [Reference 3](https://docs.gitlab.com/ee/administration/server_hooks.html)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203