-
-
Notifications
You must be signed in to change notification settings - Fork 5.9k
Closed
Labels
topic/securitySomething leaks user information or is otherwise vulnerable. Should be fixed!Something leaks user information or is otherwise vulnerable. Should be fixed!type/enhancementAn improvement of existing functionalityAn improvement of existing functionality
Milestone
Description
- Gitea version (or commit ref): 1.4.1
- Git version: NA
- Operating system: NA
- Database (use
[x]
):- PostgreSQL
- MySQL
- MSSQL
- SQLite
- Can you reproduce the bug at https://try.gitea.io:
- Yes (provide example URL)
- No
- Not relevant
- Log gist:
Description
Several tools rely on standard GitHub webhooks, which include a X-Hub-Signature
header to validate the webhook. Gitea sends the secret
in the payload JSON itself, which doesn't work for all services.
The standard github event signature is a simple HMAC-SHA1 of the request payload with the secret as the key. [Docs]
Screenshots
vszakats, huafu, Aragur, simbo1905, alexanderadam and 1 more
Metadata
Metadata
Assignees
Labels
topic/securitySomething leaks user information or is otherwise vulnerable. Should be fixed!Something leaks user information or is otherwise vulnerable. Should be fixed!type/enhancementAn improvement of existing functionalityAn improvement of existing functionality