vulnerability

FreeBSD: VID-25A697DE-BCA1-11EF-8926-9B4F2D14EB53: forgejo -- unauthorized user impersonation

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
2024-12-12
Added
2024-12-19
Modified
2025-02-19

Description



Problem Description:



When Forgejo is configured to run the internal ssh server with


[server].START_SSH_SERVER=true, it was possible for a registered user


to impersonate another user. The rootless container image uses the


internal ssh server by default and was vulnerable. A Forgejo


instance running from a binary or from a root container image does


not use the internal ssh server by default and was not vulnerable.


The incorrect use of the crypto package is the root cause of the


vulnerability and was fixed for the internal ssh server.


Revert "allow synchronizing user status from OAuth2 login


providers"




Solution

freebsd-upgrade-package-forgejo

References

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.