Gitea before 1.11.2 is affected by Trusting HTTP Permission Methods on the Server Side when referencing the vulnerable admin or user API. which could let a remote malisious user execute arbitrary code.
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.
Link | Tags |
---|---|
https://blog.gitea.io/2020/03/gitea-1.11.2-is-released/ | release notes vendor advisory |
https://github.com/go-gitea/gitea/pull/10462 | third party advisory patch |
https://github.com/go-gitea/gitea/pull/10465 | third party advisory patch |
https://github.com/go-gitea/gitea/pull/10582 | third party advisory patch |