Vulnerability Description
An Authentication Bypass vulnerability exists in Gitea before 1.5.0, which could let a malicious user gain privileges. If captured, the TOTP code for the 2FA can be submitted correctly more than once.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitea | Gitea | < 1.5.0 |
Related Weaknesses (CWE)
References
- https://blog.gitea.io/2018/08/gitea-1.5.0-is-released/Release NotesVendor Advisory
- https://github.com/go-gitea/gitea/pull/3878PatchThird Party Advisory
- https://blog.gitea.io/2018/08/gitea-1.5.0-is-released/Release NotesVendor Advisory
- https://github.com/go-gitea/gitea/pull/3878PatchThird Party Advisory
FAQ
What is CVE-2021-45331?
CVE-2021-45331 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An Authentication Bypass vulnerability exists in Gitea before 1.5.0, which could let a malicious user gain privileges. If captured, the TOTP code for the 2FA can be submitted correctly more than once.
How severe is CVE-2021-45331?
CVE-2021-45331 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-45331?
Check the references section above for vendor advisories and patch information. Affected products include: Gitea Gitea.