Lucene search

K

Gitblit Security Vulnerabilities

cve
cve

CVE-2022-31267

Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext '[email protected]\n\trole = "#admin"' value.

9.8CVSS

9.6AI Score

0.002EPSS

2022-05-21 09:15 PM
53
9
cve
cve

CVE-2022-31268

A Path Traversal vulnerability in Gitblit 1.9.3 can lead to reading website files via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname).

7.5CVSS

7.3AI Score

0.006EPSS

2022-05-21 09:15 PM
71
5