git: 91fd6b55ab18 - main - security/vuxml: Document www/gitea vulnerability
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sun, 23 Jul 2023 11:45:46 UTC
The branch main has been updated by eduardo: URL: https://cgit.FreeBSD.org/ports/commit/?id=91fd6b55ab1861914c8a7b0c00e26dbc2932aa68 commit 91fd6b55ab1861914c8a7b0c00e26dbc2932aa68 Author: Stefan Bethke <stb@lassitu.de> AuthorDate: 2023-07-23 10:53:25 +0000 Commit: Nuno Teixeira <eduardo@FreeBSD.org> CommitDate: 2023-07-23 11:45:32 +0000 security/vuxml: Document www/gitea vulnerability PR: 272672 Security: ab0bab3c-2927-11ee-8608-07b8d3947721 --- security/vuxml/vuln/2023.xml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 38c2114a663a..2ea5519ff417 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,30 @@ + <vuln vid="ab0bab3c-2927-11ee-8608-07b8d3947721"> + <topic>gitea -- Disallow dangerous URL schemes</topic> + <affects> + <package> + <name>gitea</name> + <range><lt>1.20.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Gitea team reports:</p> + <blockquote cite="https://github.com/go-gitea/gitea/pull/25960"> + <p>Disallow javascript, vbscript and data (data uri images still + work) url schemes even if all other schemes are allowed</p> + </blockquote> + </body> + </description> + <references> + <url>https://blog.gitea.com/release-of-1.20.1</url> + <url>https://github.com/go-gitea/gitea/releases/tag/v1.20.1</url> + </references> + <dates> + <discovery>2023-06-18</discovery> + <entry>2023-07-23</entry> + </dates> + </vuln> + <vuln vid="887eb570-27d3-11ee-adba-c80aa9043978"> <topic>OpenSSH -- remote code execution via a forwarded agent socket</topic> <affects>