Gitea version prior to version 1.5.1 contains a CWE-200 vulnerability that can result in Exposure of users private email addresses. This attack appear to be exploitable via Watch a repository to receive email notifications. Emails received contain the other recipients even if they have the email set as private. This vulnerability appears to have been fixed in 1.5.1.
References
| Link | Resource |
|---|---|
| https://github.com/go-gitea/gitea/pull/4664 | Patch Third Party Advisory |
| https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57 | Patch Third Party Advisory |
| https://github.com/go-gitea/gitea/pull/4664 | Patch Third Party Advisory |
| https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:40
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/go-gitea/gitea/pull/4664 - Patch, Third Party Advisory | |
| References | () https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57 - Patch, Third Party Advisory |
Information
Published : 2018-10-08 15:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000803
Mitre link : CVE-2018-1000803
CVE.ORG link : CVE-2018-1000803
JSON object : View
Products Affected
gitea
- gitea
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
