CVE-2021-45331

An Authentication Bypass vulnerability exists in Gitea before 1.5.0, which could let a malicious user gain privileges. If captured, the TOTP code for the 2FA can be submitted correctly more than once.
References
Link Resource
https://blog.gitea.io/2018/08/gitea-1.5.0-is-released/ Release Notes Vendor Advisory
https://github.com/go-gitea/gitea/pull/3878 Patch Third Party Advisory
https://blog.gitea.io/2018/08/gitea-1.5.0-is-released/ Release Notes Vendor Advisory
https://github.com/go-gitea/gitea/pull/3878 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:32

Type Values Removed Values Added
References () https://blog.gitea.io/2018/08/gitea-1.5.0-is-released/ - Release Notes, Vendor Advisory () https://blog.gitea.io/2018/08/gitea-1.5.0-is-released/ - Release Notes, Vendor Advisory
References () https://github.com/go-gitea/gitea/pull/3878 - Patch, Third Party Advisory () https://github.com/go-gitea/gitea/pull/3878 - Patch, Third Party Advisory

Information

Published : 2022-02-09 18:15

Updated : 2024-11-21 06:32


NVD link : CVE-2021-45331

Mitre link : CVE-2021-45331

CVE.ORG link : CVE-2021-45331


JSON object : View

Products Affected

gitea

  • gitea
CWE
CWE-287

Improper Authentication