FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-25 21:13:12 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
8bec3994-104d-11ed-a7ac-0800273f11eagitea -- multiple issues

The Gitea team reports:

Use git.HOME_PATH for Git HOME directory

Add write check for creating Commit status

Remove deprecated SSH ciphers from default


Discovery 2022-07-12
Entry 2022-08-05
gitea
< 1.17.0

https://github.com/go-gitea/gitea/releases/tag/v1.17.0
502ba001-7ffa-11eb-911c-0800278d94f0gitea -- multiple vulnerabilities

The Gitea Team reports for release 1.13.3:

  • Turn default hash password algorithm back to pbkdf2 from argon2 until we find a better one

The Gitea Team reports for release 1.13.4:

  • Fix issue popups

Discovery 2021-01-07
Entry 2021-02-06
gitea
< 1.13.4

https://github.com/go-gitea/gitea/releases/tag/v1.13.3
https://github.com/go-gitea/gitea/releases/tag/v1.13.4
ports/254130
5048ed45-b0f1-11ed-ab04-9106b1b896ddgitea -- password hash quality

The Gitea team reports:

This PR refactors and improves the password hashing code within gitea and makes it possible for server administrators to set the password hashing parameters.

In addition it takes the opportunity to adjust the settings for pbkdf2 in order to make the hashing a little stronger.

Add command to bulk set must-change-password

As part of administration sometimes it is appropriate to forcibly tell users to update their passwords.

This PR creates a new command gitea admin user must-change-password which will set the MustChangePassword flag on the provided users.


Discovery 2022-02-14
Entry 2023-02-20
gitea
< 1.18.4

https://blog.gitea.io/2023/02/gitea-1.18.4-is-released/
https://github.com/go-gitea/gitea/releases/tag/v1.18.4
1431a25c-8a70-11eb-bd16-0800278d94f0gitea -- quoting in markdown text

The Gitea Team reports for release 1.13.5:

  • Update to goldmark 1.3.3

Discovery 2021-03-20
Entry 2021-03-21
gitea
< 1.13.5

https://github.com/go-gitea/gitea/releases/tag/v1.13.5
ports/254130
2739b88b-4b88-11eb-a4c0-08002734b9edgitea -- multiple vulnerabilities

The Gitea Team reports for release 1.13.1:

  • Hide private participation in Orgs
  • Fix escaping issue in diff

Discovery 2020-12-15
Entry 2020-12-31
gitea
< 1.13.1

https://github.com/go-gitea/gitea/releases/tag/v1.13.1
ports/252310
be088777-6085-11ea-8609-08002731610egitea -- multiple vulnerabilities

The Gitea Team reports for release 1.11.0:

  • Never allow an empty password to validate (#9682) (#9683)
  • Prevent redirect to Host (#9678) (#9679)
  • Swagger hide search field (#9554)
  • Add "search" to reserved usernames (#9063)
  • Switch to fomantic-ui (#9374)
  • Only serve attachments when linked to issue/release and if accessible by user (#9340)

The Gitea Team reports for release 1.11.2:

  • Ensure only own addresses are updated (#10397) (#10399)
  • Logout POST action (#10582) (#10585)
  • Org action fixes and form cleanup (#10512) (#10514)
  • Change action GETs to POST (#10462) (#10464)
  • Fix admin notices (#10480) (#10483)
  • Change admin dashboard to POST (#10465) (#10466)
  • Update markbates/goth (#10444) (#10445)
  • Update crypto vendors (#10385) (#10398)

Discovery 2019-11-18
Entry 2020-03-07
gitea
< 1.11.2

https://blog.gitea.io/2020/02/gitea-1.11.0-is-released/
https://blog.gitea.io/2020/03/gitea-1.11.2-is-released/
ports/244025
943d23b6-e65e-11eb-ad30-0800273f11eagitea -- multiple vulnerabilities

The Gitea Team reports for release 1.14.5:

  • Hide mirror passwords on repo settings page (#16022) (#16355)
  • Update bluemonday to v1.0.15 (#16379) (#16380)

Discovery 2021-05-16
Entry 2021-07-18
gitea
< 1.14.5

https://github.com/go-gitea/gitea/releases/tag/v1.14.5
ports/257221
a512a412-3a33-11ea-af63-0800274e5f20gitea -- multiple vulnerabilities

The Gitea Team reports:

  • Hide credentials when submitting migration
  • Never allow an empty password to validate
  • Prevent redirect to Host
  • Hide public repos owned by private orgs

Discovery 2019-11-22
Entry 2020-01-18
gitea
< 1.10.3

https://github.com/go-gitea/gitea/releases/tag/v1.10.3
ports/243437
c4d2f950-8c27-11eb-a3ae-0800278d94f0gitea -- multiple vulnerabilities

The Gitea Team reports for release 1.13.6:

  • Fix bug on avatar middleware
  • Fix another clusterfuzz identified issue

Discovery 2021-03-21
Entry 2021-03-23
gitea
< 1.13.6

https://github.com/go-gitea/gitea/releases/tag/v1.13.5
ports/254515
83466f76-aefe-11ec-b4b6-d05099c0c059gitea -- Open Redirect on login

Andrew Thornton reports:

When a location containing backslashes is presented, the existing protections against open redirect are bypassed, because browsers will convert adjacent forward and backslashes within the location to double forward slashes.


Discovery 2022-03-23
Entry 2022-03-29
gitea
< 1.16.5

CVE-2022-1058
https://huntr.dev/bounties/4fb42144-ac70-4f76-a5e1-ef6b5e55dc0d/
d713d709-4cc9-11ed-a621-0800277bb8a8gitea -- multiple issues

The Gitea team reports:

Sanitize and Escape refs in git backend

Bump golang.org/x/text

Update bluemonday


Discovery 2022-09-27
Entry 2022-10-15
gitea
< 1.17.3

https://github.com/go-gitea/gitea/releases/tag/v1.17.3
0e561c06-d13a-11eb-92be-0800273f11eagitea -- multiple vulnerabilities

The Gitea Team reports for release 1.14.3:

  • Encrypt migration credentials at rest (#15895) (#16187)
  • Only check access tokens if they are likely to be tokens (#16164) (#16171)
  • Add missing SameSite settings for the i_like_gitea cookie (#16037) (#16039)
  • Fix setting of SameSite on cookies (#15989) (#15991)

Discovery 2021-05-16
Entry 2021-06-19
gitea
< 1.14.3

https://github.com/go-gitea/gitea/releases/tag/v1.14.3
ports/256720
55facdb0-2c24-11eb-9aac-08002734b9edgitea -- multiple vulnerabilities

The Gitea Team reports for release 1.12.6:

  • Prevent git operations for inactive users
  • Disallow urlencoded new lines in git protocol paths if there is a port

Discovery 2020-11-16
Entry 2020-11-21
gitea
< 1.12.6

Disallow urlencoded new lines in git protocol paths if there is a port
ports/251296
1650cee2-a320-11ea-a090-08002734b9edgitea -- multiple vulnerabilities

The Gitea Team reports for release 1.11.6:

  • Fix missing authorization check on pull for public repos of private/limited org (#11656) (#11683)
  • Use session for retrieving org teams (#11438) (#11439)

Discovery 2020-03-01
Entry 2020-05-31
gitea
< 1.11.6

https://github.com/go-gitea/gitea/releases/tag/v1.11.6
ports/246892
0ff80f41-aefe-11ec-b4b6-d05099c0c059gitea -- Improper/incorrect authorization

Youssef Rebahi-Gilbert reports:

When Gitea is built and configured for PAM authentication it skips checking authorization completely. Therefore expired accounts and accounts with expired passwords can still login.


Discovery 2022-03-06
Entry 2022-03-29
gitea
< 1.16.4

CVE-2022-0905
https://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb
d3180f02-031e-11ec-875f-0800273f11eagitea -- multiple vulnerabilities

The Gitea Team reports for release 1.15.0:

  • Encrypt LDAP bind password in db with SECRET_KEY (#15547)
  • Remove random password in Dockerfiles (#15362)
  • Upgrade to the latest version of golang-jwt and increase minimum go to 1.15 (#16590) (#16606)
  • Correctly create of git-daemon-export-ok files (#16508) (#16514)
  • Don't show private user's repo in explore view (#16550) (#16554)
  • Update node tar dependency to 6.1.6 (#16622) (#16623)

Discovery 2021-04-29
Entry 2021-08-22
gitea
< 1.15.0

https://github.com/go-gitea/gitea/releases/tag/v1.15.0
ports/257994
df794e5d-3975-11ec-84e8-0800273f11eagitea -- multiple vulnerabilities

The Gitea Team reports for release 1.15.5:

  • Upgrade Bluemonday to v1.0.16 (#17372) (#17374)
  • Ensure correct SSH permissions check for private and restricted users (#17370) (#17373)

Discovery 2021-10-21
Entry 2021-11-04
gitea
< 1.15.5

https://github.com/go-gitea/gitea/releases/tag/v1.15.5
ports/259548
733afd81-01cf-11ec-aec9-0800273f11eagitea -- multiple vulnerabilities

The Gitea Team reports for release 1.14.6:

  • Bump github.com/markbates/goth from v1.67.1 to v1.68.0 (#16538) (#16540)
  • Switch to maintained JWT lib (#16532) (#16535)
  • Upgrade to latest version of golang-jwt (as forked for 1.14) (#16590) (#16607)

Discovery 2021-07-24
Entry 2021-08-20
gitea
< 1.14.6

https://github.com/go-gitea/gitea/releases/tag/v1.14.6
ports/257973
8ba23a62-997d-11eb-9f0e-0800278d94f0gitea -- multiple vulnerabilities

The Gitea Team reports for release 1.13.7:

  • Update to bluemonday-1.0.6
  • Clusterfuzz found another way

Discovery 2021-04-07
Entry 2021-04-09
gitea
< 1.13.7

https://github.com/go-gitea/gitea/releases/tag/v1.13.7
ports/254930
b2765c89-a052-11ee-bed2-596753f1a87cgitea -- Prefix Truncation Attack against ChaCha20-Poly1305 and Encrypt-then-MAC aka Terrapin

The Gitea team reports:

Update golang.org/x/crypto


Discovery 2023-12-19
Entry 2023-12-21
gitea
< 1.21.3

https://github.com/go-gitea/gitea/releases/tag/v1.21.3
f75722ce-31b0-11ed-8b56-0800277bb8a8gitea -- multiple issues

The Gitea team reports:

Double check CloneURL is acceptable

Add more checks in migration code


Discovery 2022-08-19
Entry 2022-09-11
gitea
< 1.17.2

https://blog.gitea.io/2022/09/gitea-1.17.2-is-released/
482bb980-99a3-11ee-b5f7-6bd56600d90cgitea -- missing permission checks

The Gitea team reports:

Fix missing check

Do some missing checks

By crafting an API request, attackers can access the contents of issues even though the logged-in user does not have access rights to these issues.


Discovery 2023-08-30
Entry 2023-09-10
gitea
< 1.21.2

https://github.com/go-gitea/gitea/releases/tag/v1.21.2
bd7592a1-cbfd-11ee-a42a-5404a6f3ca32gitea -- Prevent anonymous container access

Problem Description:

Even with RequireSignInView enabled, anonymous users can use docker pull to fetch public images.


Discovery 2024-01-24
Entry 2024-02-15
gitea
< 1.21.5

https://blog.gitea.com/release-of-1.21.5/
95ee401d-cc6a-11ec-9cfc-10c37b4ac2eagitea -- Escape git fetch remote

The Gitea team reports:

Escape git fetch remote in services/migrations/gitea_uploader.go


Discovery 2022-04-25
Entry 2022-05-05
gitea
< 1.16.7

https://github.com/go-gitea/gitea/pull/19487
b8a0fea2-9be9-11ed-8acf-0800277bb8a8gitea -- information disclosure

The Gitea team reports:

Prevent multiple To recipients: Change the mailer interface to prevent leaking of possible hidden email addresses when sending to multiple recipients.


Discovery 2022-01-22
Entry 2023-01-24
gitea
< 1.18.3

https://blog.gitea.io/2023/01/gitea-1.18.3-is-released/
8ea24413-1b15-11ee-9331-570525adb7f1gitea -- avoid open HTTP redirects

The Gitea team reports:

If redirect_to parameter has set value starting with \\example.com redirect will be created with header Location: /\\example.com that will redirect to example.com domain.


Discovery 2023-06-08
Entry 2023-07-05
gitea
< 1.19.4

https://blog.gitea.io/2023/07/gitea-1.19.4-is-released/
https://github.com/go-gitea/gitea/releases/tag/v1.19.4
5ecfb588-d2f4-11ee-ad82-dbdfaa8acfc2gitea -- Fix XSS vulnerabilities

Problem Description:

  • The Wiki page did not sanitize author name
  • the reviewer name on a "dismiss review" comment is also affected
  • the migration page has some spots

Discovery 2024-02-23
Entry 2024-02-24
gitea
< 1.21.6

https://blog.gitea.com/release-of-1.21.6/
86c330fe-bbae-4ca7-85f7-5321e627a4ebgitea -- multiple issues

The Gitea team reports:

Remove ReverseProxy authentication from the API

Support Go Vulnerability Management

Forbid HTML string tooltips


Discovery 2022-08-23
Entry 2023-01-02
gitea
< 1.18.0

https://blog.gitea.io/2022/12/gitea-1.18.0-is-released/
https://github.com/go-gitea/gitea/releases/tag/v1.18.0
b3f77aae-241c-11ee-9684-c11c23f7b0f9gitea -- multiple issues

The Gitea team reports:

Test if container blob is accessible before mounting.

Set type="password" on all auth_token fields

Seen when migrating from other hosting platforms.

Prevents exposing the token to screen capture/cameras/eyeballs.

Prevents the browser from saving the value in its autocomplete dictionary, which often is not secure.


Discovery 2023-06-08
Entry 2023-07-05
gitea
< 1.20.0

https://blog.gitea.com/release-of-1.20.0
https://github.com/go-gitea/gitea/releases/tag/v1.20.0
4061a4b2-4fb1-11ee-acc7-0151f07bc899gitea -- block user account creation from blocked email domains

The Gitea team reports:

check blocklist for emails when adding them to account


Discovery 2023-08-30
Entry 2023-09-10
gitea
< 1.20.3

https://blog.gitea.com/release-of-1.20.4
https://github.com/go-gitea/gitea/releases/tag/v1.20.4
d0da046a-81e6-11ed-96ca-0800277bb8a8gitea -- multiple issues

The Gitea team reports:

Do not allow Ghost access to limited visible user/org

Fix package access for admins and inactive users


Discovery 2022-10-24
Entry 2022-12-22
gitea
< 1.17.4

https://github.com/go-gitea/gitea/releases/tag/v1.17.4
cdb10765-6879-11eb-a7d8-08002734b9edgitea -- multiple vulnerabilities

The Gitea Team reports for release 1.13.2:

  • Prevent panic on fuzzer provided string
  • Add secure/httpOnly attributes to the lang cookie

Discovery 2021-01-07
Entry 2021-02-06
gitea
< 1.13.2

https://github.com/go-gitea/gitea/releases/tag/v1.13.2
ports/253295
df29c391-1046-11ed-a7ac-0800273f11eagitea -- multiple issues

The Gitea team reports:

Add write check for creating Commit status

Check for permission when fetching user controlled issues


Discovery 2022-07-12
Entry 2022-08-05
gitea
< 1.16.9

https://github.com/go-gitea/gitea/releases/tag/v1.16.9
b99492b2-362b-11eb-9f86-08002734b9edgitea -- multiple vulnerabilities

The Gitea Team reports for release 1.13.0:

  • Add Allow-/Block-List for Migrate and Mirrors
  • Prevent git operations for inactive users
  • Disallow urlencoded new lines in git protocol paths if there is a port
  • Mitigate Security vulnerability in the git hook feature
  • Disable DSA ssh keys by default
  • Set TLS minimum version to 1.2
  • Use argon as default password hash algorithm
  • Escape failed highlighted files

Discovery 2020-12-01
Entry 2020-12-04
gitea
< 1.13.0

https://github.com/go-gitea/gitea/releases/tag/v1.13.0
ports/251577
094fb2ec-9aa3-11eb-83cb-0800278d94f0gitea -- multiple vulnerabilities

The Gitea Team reports for release 1.14.0:

  • Validate email in external authenticator registration form
  • Ensure validation occurs on clone addresses too

Discovery 2021-03-11
Entry 2021-04-11
gitea
< 1.14.0

https://github.com/go-gitea/gitea/releases/tag/v1.14.0
ports/254976
36a37c92-44b1-11ee-b091-6162c1274384gitea -- information disclosure

The Gitea team reports:

Fix API leaking Usermail if not logged in

The API should only return the real Mail of a User, if the caller is logged in. The check do to this don't work. This PR fixes this. This not really a security issue, but can lead to Spam.


Discovery 2023-06-06
Entry 2023-08-27
gitea
< 1.20.3

https://blog.gitea.com/release-of-1.20.3
https://github.com/go-gitea/gitea/releases/tag/v1.20.3
ab0bab3c-2927-11ee-8608-07b8d3947721gitea -- Disallow dangerous URL schemes

The Gitea team reports:

Disallow javascript, vbscript and data (data uri images still work) url schemes even if all other schemes are allowed


Discovery 2023-06-18
Entry 2023-07-23
gitea
< 1.20.1

https://blog.gitea.com/release-of-1.20.1
https://github.com/go-gitea/gitea/releases/tag/v1.20.1