0.7.0
10 years ago
3 years ago
Known vulnerabilities in the kallithea package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to CRLF Injection by allowing remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the How to fix CRLF Injection? Upgrade | [,0.3) |
Affected versions of this package are vulnerable to Information Exposure due to allowing remote authenticated users to obtain API keys and other sensitive information via the How to fix Information Exposure? A fix was pushed into the | [0,) |
Affected versions of the package are vulnerable to Cross-site Request Forgery (CSRF) attacks. The lack of CSRF protection in the POST forms aenabled attackers trick users into performing a specific action, and changing their input in the HTTP POST request. How to fix Cross-site Request Forgery (CSRF)? Upgrade | [,0.2) |
Affected Versions of this package are vulnerable to Cross-site Scripting (XSS) attacks. Multiple cross-site scripting (XSS) vulnerabilities in the administration pages in Kallithea before 0.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) first name or (2) last name user details, or the (3) repository, (4) repository group, or (5) user group description. How to fix Cross-site Scripting (XSS)? Upgrade | [,0.2.1) |
Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) attacks. It allows remote attackers to bypass the CSRF protection by using the GET HTTP request method. | [,0.3.2) |
Affected versions of this package are vulnerable to Privilege Escalation. It allows remote authenticated users to edit or delete open pull requests or delete comments by leveraging read access. | [,0.3.2) |