vulnerability

FreeBSD: VID-f07c8f87-8e65-11ef-81b8-659bf0027d16: forgejo -- multiple vulnerabilities

Severity
8
CVSS
(AV:N/AC:M/Au:S/C:C/I:C/A:N)
Published
Oct 29, 2024
Added
Oct 31, 2024
Modified
Dec 10, 2025

Description

Problem Description: Forgejo generates a token which is used to authenticate web endpoints that are only meant to be used internally, for instance when the SSH daemon is used to push a commit with Git. The verification of this token was not done in constant time and was susceptible to timing attacks. A pre-condition for such an attack is the precise measurements of the time for each operation. Since it requires observing the timing of network operations, the issue is mitigated when a Forgejo instance is accessed over the internet because the ISP introduce unpredictable random delays. Because of a missing permission check, the branch used to propose a pull request to a repository can always be deleted by the user performing the merge. It was fixed so that such a deletion is only allowed if the user performing the merge has write permission to the repository from which the pull request was made.

Solutions

freebsd-upgrade-package-forgejofreebsd-upgrade-package-forgejo7

References

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.