Server-Side Request Forgery (SSRF) in Gitea - CVE-2020-28991
Published: November 24, 2020 / Updated: November 27, 2020
Gitea
The Gitea Authors
Description
The disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input within the in ParseRemoteAddr() function in "modules/auth/repo_form.go". The application accepts "git" protocol along with a custom TCP port number and new lines within an encoded URL. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.