CVE-2022-30781: Shell command injection in gitea
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99346%
CWE
Published
5/17/2022
Updated
1/28/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
code.gitea.io/gitea | go | < 1.16.7 | 1.16.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- The CWE-116 indicates improper output escaping, matching command injection patterns
- The GitHub PR #19487 shows modifications to
gitea_uploader.go
adding--notags
and command escaping - The vulnerability specifically mentions
git fetch remote
as the injection vector - The patch focuses on argument sanitization in migration handling code
- Packet Storm references confirm RCE through git fetch parameter manipulation
- The file path matches the component responsible for repository migration operations