An Authentication Bypass vulnerability exists in Gitea before 1.5.0, which could let a malicious user gain privileges. If captured, the TOTP code for the 2FA can be submitted correctly more than once.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://blog.gitea.io/2018/08/gitea-1.5.0-is-released/ | release notes vendor advisory |
https://github.com/go-gitea/gitea/pull/3878 | third party advisory patch |