Privilege Escalation via Control Character Injection in Gitblit 1.9.2

Privilege Escalation via Control Character Injection in Gitblit 1.9.2

CVE-2022-31267 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext 'attacker@example.com\n\trole = "#admin"' value.

Learn more about our User Device Pen Test.