FreeBSD : gitea -- avoid open HTTP redirects (8ea24413-1b15-11ee-9331-570525adb7f1)

high Nessus Plugin ID 178013

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 8ea24413-1b15-11ee-9331-570525adb7f1 advisory.

- The Gitea team reports: If redirect_to parameter has set value starting with \\example.com redirect will be created with header Location: /\\example.com that will redirect to example.com domain. (8ea24413-1b15-11ee-9331-570525adb7f1)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://blog.gitea.io/2023/07/gitea-1.19.4-is-released/

https://github.com/go-gitea/gitea/releases/tag/v1.19.4

http://www.nessus.org/u?3418d955

Plugin Details

Severity: High

ID: 178013

File Name: freebsd_pkg_8ea244131b1511ee9331570525adb7f1.nasl

Version: 1.0

Type: local

Published: 7/6/2023

Updated: 7/6/2023

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:gitea, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 7/5/2023

Vulnerability Publication Date: 6/8/2023