446
VMScore

CVE-2022-30781

Published: 16/05/2022 Updated: 27/01/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Gitea prior to 1.16.7 does not escape git fetch remote.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gitea gitea

Vendor Advisories

Check Point Reference: CPAI-2022-1966 Date Published: 24 Dec 2023 Severity: High ...

Exploits

This Metasploit module exploits the Git fetch command in Gitea repository migration process that leads to a remote command execution on the system This vulnerability affects Gitea versions prior to 1167 ...

Github Repositories

🍵 CVE-2022-30781 Gitea repository migration remote command execution exploit How to use Run an HTTP filesystem server with the files in this repository Edit the command to be exeucted in api/v1/repos/e99/exp/pulls/1/indexhtml L96 Migrate remote repository with URL <your_host>/e99/exp on the Gitea instance Pwnned! Reference tttangcom/archi

🍵 Gitea repository migration remote command execution exploit.

🍵 CVE-2022-30781 Gitea repository migration remote command execution exploit How to use Run an HTTP filesystem server with the files in this repository Edit the command to be exeucted in api/v1/repos/e99/exp/pulls/1/indexhtml L96 Migrate remote repository with URL <your_host>/e99/exp on the Gitea instance Pwnned! Reference tttangcom/archi