CVE-2020-14144

The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states "This is a functionality of the software that is limited to a very limited subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides.
References
Link Resource
http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
https://docs.github.com/en/enterprise-server%402.19/admin/policies/creating-a-pre-receive-hook-script
https://docs.gitlab.com/ee/administration/server_hooks.html Third Party Advisory
https://github.com/PandatiX/CVE-2021-28378 Exploit Third Party Advisory
https://github.com/PandatiX/CVE-2021-28378#notes Exploit Third Party Advisory
https://github.com/go-gitea/gitea/pull/13058 Third Party Advisory
https://github.com/go-gitea/gitea/releases Release Notes Third Party Advisory
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-3-schwachstelle-in-gitea-1125-und-gogs-0122-ermoeglicht-ausfuehrung-von-code-nach-authent/ Third Party Advisory
http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
https://docs.github.com/en/enterprise-server%402.19/admin/policies/creating-a-pre-receive-hook-script
https://docs.gitlab.com/ee/administration/server_hooks.html Third Party Advisory
https://github.com/PandatiX/CVE-2021-28378 Exploit Third Party Advisory
https://github.com/PandatiX/CVE-2021-28378#notes Exploit Third Party Advisory
https://github.com/go-gitea/gitea/pull/13058 Third Party Advisory
https://github.com/go-gitea/gitea/releases Release Notes Third Party Advisory
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-3-schwachstelle-in-gitea-1125-und-gogs-0122-ermoeglicht-ausfuehrung-von-code-nach-authent/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:02

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://docs.github.com/en/enterprise-server%402.19/admin/policies/creating-a-pre-receive-hook-script - () https://docs.github.com/en/enterprise-server%402.19/admin/policies/creating-a-pre-receive-hook-script -
References () https://docs.gitlab.com/ee/administration/server_hooks.html - Third Party Advisory () https://docs.gitlab.com/ee/administration/server_hooks.html - Third Party Advisory
References () https://github.com/PandatiX/CVE-2021-28378 - Exploit, Third Party Advisory () https://github.com/PandatiX/CVE-2021-28378 - Exploit, Third Party Advisory
References () https://github.com/PandatiX/CVE-2021-28378#notes - Exploit, Third Party Advisory () https://github.com/PandatiX/CVE-2021-28378#notes - Exploit, Third Party Advisory
References () https://github.com/go-gitea/gitea/pull/13058 - Third Party Advisory () https://github.com/go-gitea/gitea/pull/13058 - Third Party Advisory
References () https://github.com/go-gitea/gitea/releases - Release Notes, Third Party Advisory () https://github.com/go-gitea/gitea/releases - Release Notes, Third Party Advisory
References () https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-3-schwachstelle-in-gitea-1125-und-gogs-0122-ermoeglicht-ausfuehrung-von-code-nach-authent/ - Third Party Advisory () https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-3-schwachstelle-in-gitea-1125-und-gogs-0122-ermoeglicht-ausfuehrung-von-code-nach-authent/ - Third Party Advisory

07 Nov 2023, 03:17

Type Values Removed Values Added
Summary ** DISPUTED ** The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states "This is a functionality of the software that is limited to a very limited subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides." The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states "This is a functionality of the software that is limited to a very limited subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides.
References
  • {'url': 'https://docs.github.com/en/enterprise-server@2.19/admin/policies/creating-a-pre-receive-hook-script', 'name': 'https://docs.github.com/en/enterprise-server@2.19/admin/policies/creating-a-pre-receive-hook-script', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • () https://docs.github.com/en/enterprise-server%402.19/admin/policies/creating-a-pre-receive-hook-script -

Information

Published : 2020-10-16 14:15

Updated : 2024-11-21 05:02


NVD link : CVE-2020-14144

Mitre link : CVE-2020-14144

CVE.ORG link : CVE-2020-14144


JSON object : View

Products Affected

gitea

  • gitea
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')