FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-25 21:13:12 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
4061a4b2-4fb1-11ee-acc7-0151f07bc899gitea -- block user account creation from blocked email domains

The Gitea team reports:

check blocklist for emails when adding them to account


Discovery 2023-08-30
Entry 2023-09-10
gitea
< 1.20.3

https://blog.gitea.com/release-of-1.20.4
https://github.com/go-gitea/gitea/releases/tag/v1.20.4
b2765c89-a052-11ee-bed2-596753f1a87cgitea -- Prefix Truncation Attack against ChaCha20-Poly1305 and Encrypt-then-MAC aka Terrapin

The Gitea team reports:

Update golang.org/x/crypto


Discovery 2023-12-19
Entry 2023-12-21
gitea
< 1.21.3

https://github.com/go-gitea/gitea/releases/tag/v1.21.3
df29c391-1046-11ed-a7ac-0800273f11eagitea -- multiple issues

The Gitea team reports:

Add write check for creating Commit status

Check for permission when fetching user controlled issues


Discovery 2022-07-12
Entry 2022-08-05
gitea
< 1.16.9

https://github.com/go-gitea/gitea/releases/tag/v1.16.9
5ecfb588-d2f4-11ee-ad82-dbdfaa8acfc2gitea -- Fix XSS vulnerabilities

Problem Description:

  • The Wiki page did not sanitize author name
  • the reviewer name on a "dismiss review" comment is also affected
  • the migration page has some spots

Discovery 2024-02-23
Entry 2024-02-24
gitea
< 1.21.6

https://blog.gitea.com/release-of-1.21.6/
bd7592a1-cbfd-11ee-a42a-5404a6f3ca32gitea -- Prevent anonymous container access

Problem Description:

Even with RequireSignInView enabled, anonymous users can use docker pull to fetch public images.


Discovery 2024-01-24
Entry 2024-02-15
gitea
< 1.21.5

https://blog.gitea.com/release-of-1.21.5/
ab0bab3c-2927-11ee-8608-07b8d3947721gitea -- Disallow dangerous URL schemes

The Gitea team reports:

Disallow javascript, vbscript and data (data uri images still work) url schemes even if all other schemes are allowed


Discovery 2023-06-18
Entry 2023-07-23
gitea
< 1.20.1

https://blog.gitea.com/release-of-1.20.1
https://github.com/go-gitea/gitea/releases/tag/v1.20.1
f75722ce-31b0-11ed-8b56-0800277bb8a8gitea -- multiple issues

The Gitea team reports:

Double check CloneURL is acceptable

Add more checks in migration code


Discovery 2022-08-19
Entry 2022-09-11
gitea
< 1.17.2

https://blog.gitea.io/2022/09/gitea-1.17.2-is-released/
b3f77aae-241c-11ee-9684-c11c23f7b0f9gitea -- multiple issues

The Gitea team reports:

Test if container blob is accessible before mounting.

Set type="password" on all auth_token fields

Seen when migrating from other hosting platforms.

Prevents exposing the token to screen capture/cameras/eyeballs.

Prevents the browser from saving the value in its autocomplete dictionary, which often is not secure.


Discovery 2023-06-08
Entry 2023-07-05
gitea
< 1.20.0

https://blog.gitea.com/release-of-1.20.0
https://github.com/go-gitea/gitea/releases/tag/v1.20.0
df794e5d-3975-11ec-84e8-0800273f11eagitea -- multiple vulnerabilities

The Gitea Team reports for release 1.15.5:

  • Upgrade Bluemonday to v1.0.16 (#17372) (#17374)
  • Ensure correct SSH permissions check for private and restricted users (#17370) (#17373)

Discovery 2021-10-21
Entry 2021-11-04
gitea
< 1.15.5

https://github.com/go-gitea/gitea/releases/tag/v1.15.5
ports/259548
8bec3994-104d-11ed-a7ac-0800273f11eagitea -- multiple issues

The Gitea team reports:

Use git.HOME_PATH for Git HOME directory

Add write check for creating Commit status

Remove deprecated SSH ciphers from default


Discovery 2022-07-12
Entry 2022-08-05
gitea
< 1.17.0

https://github.com/go-gitea/gitea/releases/tag/v1.17.0
8ea24413-1b15-11ee-9331-570525adb7f1gitea -- avoid open HTTP redirects

The Gitea team reports:

If redirect_to parameter has set value starting with \\example.com redirect will be created with header Location: /\\example.com that will redirect to example.com domain.


Discovery 2023-06-08
Entry 2023-07-05
gitea
< 1.19.4

https://blog.gitea.io/2023/07/gitea-1.19.4-is-released/
https://github.com/go-gitea/gitea/releases/tag/v1.19.4
482bb980-99a3-11ee-b5f7-6bd56600d90cgitea -- missing permission checks

The Gitea team reports:

Fix missing check

Do some missing checks

By crafting an API request, attackers can access the contents of issues even though the logged-in user does not have access rights to these issues.


Discovery 2023-08-30
Entry 2023-09-10
gitea
< 1.21.2

https://github.com/go-gitea/gitea/releases/tag/v1.21.2
0ff80f41-aefe-11ec-b4b6-d05099c0c059gitea -- Improper/incorrect authorization

Youssef Rebahi-Gilbert reports:

When Gitea is built and configured for PAM authentication it skips checking authorization completely. Therefore expired accounts and accounts with expired passwords can still login.


Discovery 2022-03-06
Entry 2022-03-29
gitea
< 1.16.4

CVE-2022-0905
https://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb
d713d709-4cc9-11ed-a621-0800277bb8a8gitea -- multiple issues

The Gitea team reports:

Sanitize and Escape refs in git backend

Bump golang.org/x/text

Update bluemonday


Discovery 2022-09-27
Entry 2022-10-15
gitea
< 1.17.3

https://github.com/go-gitea/gitea/releases/tag/v1.17.3
83466f76-aefe-11ec-b4b6-d05099c0c059gitea -- Open Redirect on login

Andrew Thornton reports:

When a location containing backslashes is presented, the existing protections against open redirect are bypassed, because browsers will convert adjacent forward and backslashes within the location to double forward slashes.


Discovery 2022-03-23
Entry 2022-03-29
gitea
< 1.16.5

CVE-2022-1058
https://huntr.dev/bounties/4fb42144-ac70-4f76-a5e1-ef6b5e55dc0d/
b8a0fea2-9be9-11ed-8acf-0800277bb8a8gitea -- information disclosure

The Gitea team reports:

Prevent multiple To recipients: Change the mailer interface to prevent leaking of possible hidden email addresses when sending to multiple recipients.


Discovery 2022-01-22
Entry 2023-01-24
gitea
< 1.18.3

https://blog.gitea.io/2023/01/gitea-1.18.3-is-released/
5048ed45-b0f1-11ed-ab04-9106b1b896ddgitea -- password hash quality

The Gitea team reports:

This PR refactors and improves the password hashing code within gitea and makes it possible for server administrators to set the password hashing parameters.

In addition it takes the opportunity to adjust the settings for pbkdf2 in order to make the hashing a little stronger.

Add command to bulk set must-change-password

As part of administration sometimes it is appropriate to forcibly tell users to update their passwords.

This PR creates a new command gitea admin user must-change-password which will set the MustChangePassword flag on the provided users.


Discovery 2022-02-14
Entry 2023-02-20
gitea
< 1.18.4

https://blog.gitea.io/2023/02/gitea-1.18.4-is-released/
https://github.com/go-gitea/gitea/releases/tag/v1.18.4
95ee401d-cc6a-11ec-9cfc-10c37b4ac2eagitea -- Escape git fetch remote

The Gitea team reports:

Escape git fetch remote in services/migrations/gitea_uploader.go


Discovery 2022-04-25
Entry 2022-05-05
gitea
< 1.16.7

https://github.com/go-gitea/gitea/pull/19487
86c330fe-bbae-4ca7-85f7-5321e627a4ebgitea -- multiple issues

The Gitea team reports:

Remove ReverseProxy authentication from the API

Support Go Vulnerability Management

Forbid HTML string tooltips


Discovery 2022-08-23
Entry 2023-01-02
gitea
< 1.18.0

https://blog.gitea.io/2022/12/gitea-1.18.0-is-released/
https://github.com/go-gitea/gitea/releases/tag/v1.18.0
d0da046a-81e6-11ed-96ca-0800277bb8a8gitea -- multiple issues

The Gitea team reports:

Do not allow Ghost access to limited visible user/org

Fix package access for admins and inactive users


Discovery 2022-10-24
Entry 2022-12-22
gitea
< 1.17.4

https://github.com/go-gitea/gitea/releases/tag/v1.17.4
36a37c92-44b1-11ee-b091-6162c1274384gitea -- information disclosure

The Gitea team reports:

Fix API leaking Usermail if not logged in

The API should only return the real Mail of a User, if the caller is logged in. The check do to this don't work. This PR fixes this. This not really a security issue, but can lead to Spam.


Discovery 2023-06-06
Entry 2023-08-27
gitea
< 1.20.3

https://blog.gitea.com/release-of-1.20.3
https://github.com/go-gitea/gitea/releases/tag/v1.20.3