CVE-2022-31267
21.05.2022, 21:15
Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext 'attacker@example.com\n\trole = "#admin"' value.Enginsight
Vendor | Product | Version |
---|---|---|
gitblit | gitblit | 1.9.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration