CVE-2022-3078116.05.2022, 04:15Gitea before 1.16.7 does not escape git fetch remote.EnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST7.5 HIGHNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NmitreCNA------CVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 99%VendorProductVersiongiteagitea𝑥< 1.16.7𝑥= Vulnerable software versionsKnown Exploits!http://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.htmlhttp://packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.htmlhttp://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.htmlhttp://packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.htmlCommon Weakness EnumerationCWE-116 - Improper Encoding or Escaping of OutputThe software prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.Referenceshttp://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.htmlhttp://packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.htmlhttps://blog.gitea.io/2022/05/gitea-1.16.7-is-released/https://github.com/go-gitea/gitea/pull/19487https://github.com/go-gitea/gitea/pull/19490http://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.htmlhttp://packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.htmlhttps://blog.gitea.io/2022/05/gitea-1.16.7-is-released/https://github.com/go-gitea/gitea/pull/19487https://github.com/go-gitea/gitea/pull/19490