github.com/go-gitea/gitea is vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere
15
Low Risk
Affected versions of this package are vulnerable to information leakage due to login error messages that allow user enumeration by distinguishing between non-existing users and invalid passwords, exposure of release drafts to non-writer users, and API responses that reveal signature email addresses instead of user profile emails. An attacker can exploit this by analyzing error messages to enumerate valid usernames for targeted attacks, accessing sensitive draft release information without authorization, and harvesting email addresses through API calls for phishing or spam campaigns.
You are affected if you are using a version that falls within the vulnerable range.
github.com/go-gitea/gitea is vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere in versions 1.0.0 - 1.25.1.
Upgrade the github.com/go-gitea/gitea library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant