forgejo -- multiple vulnerabilities
Details
| VuXML ID | f07c8f87-8e65-11ef-81b8-659bf0027d16 | 
| Discovery | 2024-10-28 | 
| Entry | 2024-10-29 | 
Problem Description:
       - Forgejo generates a token which is used to authenticate web
       endpoints that are only meant to be used internally, for instance
       when the SSH daemon is used to push a commit with Git.  The
       verification of this token was not done in constant time and was
       susceptible to timing attacks.  A pre-condition for such an attack is
       the precise measurements of the time for each operation.  Since it
       requires observing the timing of network operations, the issue is
       mitigated when a Forgejo instance is accessed over the internet
       because the ISP introduce unpredictable random delays.
- Because of a missing permission check, the branch used to propose
       a pull request to a repository can always be deleted by the user
       performing the merge.  It was fixed so that such a deletion is only
       allowed if the user performing the merge has write permission to the
       repository from which the pull request was made.
 
References
    Copyright © 2003-2005 Jacques Vidrine and contributors.
    
    Please see the source of this document for full copyright
    information.