In Forgejo before 1.20.5-1, certain endpoints do not check whether an object belongs to a repository for which permissions are being checked. This allows remote attackers to read private issues, read private pull requests, delete issues, and perform other unauthorized actions.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://forgejo.org/2023-11-release-v1-20-5-1/ | release notes vendor advisory |
https://codeberg.org/forgejo/forgejo/src/branch/forgejo/RELEASE-NOTES.md | release notes vendor advisory |
https://about.gitea.com/security | not applicable |
https://github.com/gogs/gogs/security | not applicable |