Gitea version prior to version 1.5.1 contains a CWE-200 vulnerability that can result in Exposure of users private email addresses. This attack appear to be exploitable via Watch a repository to receive email notifications. Emails received contain the other recipients even if they have the email set as private. This vulnerability appears to have been fixed in 1.5.1.
References
Link | Resource |
---|---|
https://github.com/go-gitea/gitea/pull/4664 | Patch Third Party Advisory |
https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57 | Patch Third Party Advisory |
https://github.com/go-gitea/gitea/pull/4664 | Patch Third Party Advisory |
https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/go-gitea/gitea/pull/4664 - Patch, Third Party Advisory | |
References | () https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57 - Patch, Third Party Advisory |
Information
Published : 2018-10-08 15:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000803
Mitre link : CVE-2018-1000803
CVE.ORG link : CVE-2018-1000803
JSON object : View
Products Affected
gitea
- gitea
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor