aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln/2023.xml
diff options
context:
space:
mode:
authorStefan Bethke <stb@lassitu.de>2023-07-23 10:53:25 +0000
committerNuno Teixeira <eduardo@FreeBSD.org>2023-07-23 11:45:32 +0000
commit91fd6b55ab1861914c8a7b0c00e26dbc2932aa68 (patch)
tree29cbb373b330b0c5bbcd0dc79abbd2c369f219ad /security/vuxml/vuln/2023.xml
parent42d5d340adce5e1ceee1ab34657b342427e38867 (diff)
downloadports-91fd6b55ab1861914c8a7b0c00e26dbc2932aa68.tar.gz
ports-91fd6b55ab1861914c8a7b0c00e26dbc2932aa68.zip
security/vuxml: Document www/gitea vulnerability
PR: 272672 Security: ab0bab3c-2927-11ee-8608-07b8d3947721
Diffstat (limited to 'security/vuxml/vuln/2023.xml')
-rw-r--r--security/vuxml/vuln/2023.xml27
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 38c2114a663a..2ea5519ff417 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,30 @@
+ <vuln vid="ab0bab3c-2927-11ee-8608-07b8d3947721">
+ <topic>gitea -- Disallow dangerous URL schemes</topic>
+ <affects>
+ <package>
+ <name>gitea</name>
+ <range><lt>1.20.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Gitea team reports:</p>
+ <blockquote cite="https://github.com/go-gitea/gitea/pull/25960">
+ <p>Disallow javascript, vbscript and data (data uri images still
+ work) url schemes even if all other schemes are allowed</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.gitea.com/release-of-1.20.1</url>
+ <url>https://github.com/go-gitea/gitea/releases/tag/v1.20.1</url>
+ </references>
+ <dates>
+ <discovery>2023-06-18</discovery>
+ <entry>2023-07-23</entry>
+ </dates>
+ </vuln>
+
<vuln vid="887eb570-27d3-11ee-adba-c80aa9043978">
<topic>OpenSSH -- remote code execution via a forwarded agent socket</topic>
<affects>