VuXML ID | Description |
65fab89f-2231-46db-8541-978f4e87f32a | gitlab -- Remote code execution on project import
GitLab developers report:
Today we are releasing versions 10.3.4, 10.2.6, and 10.1.6 for
GitLab Community Edition (CE) and Enterprise Edition (EE).
These versions contain a number of important security fixes,
including two that prevent remote code execution, and we strongly
recommend that all GitLab installations be upgraded to one of these
versions immediately.
Discovery 2018-01-16 Entry 2018-01-17 gitlab
< 10.1.6
https://about.gitlab.com/2018/01/16/gitlab-10-dot-3-dot-4-released/
CVE-2017-0915
CVE-2018-3710
|
e72a8864-e0bc-11e7-b627-d43d7e971a1b | GitLab -- multiple vulnerabilities
GitLab reports:
User without access to private Wiki can see it on the project page
Matthias Burtscher reported that it was possible for a user to see a
private Wiki on the project page without having the corresponding
permission.
E-mail address disclosure through member search fields
Hugo Geoffroy reported via HackerOne that it was possible to find out the
full e-mail address of any user by brute-forcing the member search
field.
Groups API leaks private projects
An internal code review discovered that users were able to list private
projects they had no access to by using the Groups API.
Cross-Site Scripting (XSS) possible by editing a comment
Sylvain Heiniger reported via HackerOne that it was possible for
arbitrary JavaScript code to be executed when editing a comment.
Issue API allows any user to create a new issue even when issues are
restricted or disabled
Mohammad Hasbini reported that any user could create a new issues in a
project even when issues were disabled or restricted to team members in the
project settings.
Discovery 2017-12-08 Entry 2017-12-14 gitlab
>= 4.2.0 le 10.0.6
>= 10.1.0 le 10.1.4
>= 10.2.0 le 10.2.3
https://about.gitlab.com/2017/12/08/gitlab-10-dot-2-dot-4-security-release/
|
589de937-343f-11ef-8a7b-001b217b3468 | Gitlab -- Vulnerabilities
Gitlab reports:
Run pipelines as any user
Stored XSS injected in imported project's commit notes
CSRF on GraphQL API IntrospectionQuery
Remove search results from public projects with unauthorized repos
Cross window forgery in user application OAuth flow
Project maintainers can bypass group's merge request approval policy
ReDoS via custom built markdown page
Private job artifacts can be accessed by any user
Security fixes for banzai pipeline
ReDoS in dependency linker
Denial of service using a crafted OpenAPI file
Merge request title disclosure
Access issues and epics without having an SSO session
Non project member can promote key results to objectives
Discovery 2024-06-26 Entry 2024-06-27 gitlab-ce
gitlab-ee
>= 17.1.0 lt 17.1.1
>= 17.0.0 lt 17.0.3
>= 1.0.0 lt 16.11.5
CVE-2024-5655
CVE-2024-4901
CVE-2024-4994
CVE-2024-6323
CVE-2024-2177
CVE-2024-5430
CVE-2024-4025
CVE-2024-3959
CVE-2024-4557
CVE-2024-1493
CVE-2024-1816
CVE-2024-2191
CVE-2024-3115
CVE-2024-4011
https://about.gitlab.com/releases/2024/06/26/patch-release-gitlab-17-1-1-released/
|
b857606c-0266-11ef-8681-001b217b3468 | Gitlab -- vulnerabilities
Gitlab reports:
GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
Path Traversal leads to DoS and Restricted File Read
Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
Personal Access Token scopes not honoured by GraphQL subscriptions
Domain based restrictions bypass using a crafted email address
Discovery 2024-04-24 Entry 2024-04-24 gitlab-ce
gitlab-ee
>= 16.11.0 lt 16.11.1
>= 16.10.0 lt 16.10.4
>= 7.8.0 lt 16.9.6
CVE-2024-4024
CVE-2024-2434
CVE-2024-2829
CVE-2024-4006
CVE-2024-1347
https://about.gitlab.com/releases/2024/04/24/patch-release-gitlab-16-11-1-released/
|
6a177c87-9933-11e7-93f7-d43d7e971a1b | GitLab -- multiple vulnerabilities
GitLab reports:
Please reference CVE/URL list for details
Discovery 2017-09-07 Entry 2017-09-14 gitlab
>= 1.0.0 le 9.3.10
>= 9.4.0 le 9.4.5
>= 9.5.0 le 9.5.3
https://about.gitlab.com/2017/09/07/gitlab-9-dot-5-dot-4-security-release/
CVE-2017-5029
CVE-2016-4738
|
9557dc72-64da-11e8-bc32-d8cb8abf62dd | Gitlab -- multiple vulnerabilities
GitLab reports:
Removing public deploy keys regression
Users can update their password without entering current password
Persistent XSS - Selecting users as allowed merge request approvers
Persistent XSS - Multiple locations of user selection drop downs
include directive in .gitlab-ci.yml allows SSRF requests
Permissions issue in Merge Requests Create Service
Arbitrary assignment of project fields using "Import project"
Discovery 2018-05-29 Entry 2018-05-31 gitlab
>= 10.8.0 lt 10.8.2
>= 10.7.0 lt 10.7.5
>= 1.0 lt 10.6.6
https://about.gitlab.com/2018/05/29/security-release-gitlab-10-dot-8-dot-2-released/
|
86291013-16e6-11e8-ae9f-d43d7e971a1b | GitLab -- multiple vulnerabilities
GitLab reports:
SnippetFinder information disclosure
The GitLab SnippetFinder component contained an information disclosure
which allowed access to snippets restricted to Only team members or
configured as disabled. The issue is now resolved in the latest version.
LDAP API authorization issue
An LDAP API endpoint contained an authorization vulnerability which
unintentionally disclosed bulk LDAP groups data. This issue is now fixed in
the latest release.
Persistent XSS mermaid markdown
The mermaid markdown feature contained a persistent XSS issue that is now
resolved in the latest release.
Insecure direct object reference Todo API
The Todo API was vulnerable to an insecure direct object reference issue
which resulted in an information disclosure of confidential data.
GitHub import access control issue
An improper access control weakness issue was discovered in the GitHub
import feature. The issue allowed an attacker to create projects under other
accounts which they shouldn't have access to. The issue is now resolved in
the latest version.
Protected variables information disclosure
The CI jobs protected tag feature contained a vulnerability which
resulted in an information disclosure of protected variables. The issue is
now resolved in the latest release.
Discovery 2018-02-07 Entry 2018-02-21 gitlab
>= 6.1.0 le 10.2.7
>= 10.3.0 le 10.3.6
>= 10.4.0 le 10.4.2
https://about.gitlab.com/2018/02/07/gitlab-security-10-4-3-plus-10-3-7-plus-10-2-8-blog/
|
92cd1c03-2940-11ef-bc02-001b217b3468 | Gitlab -- Vulnerabilities
Gitlab reports:
ReDoS in gomod dependency linker
ReDoS in CI interpolation (fix bypass)
ReDoS in Asana integration issue mapping when webhook is called
XSS and content injection when viewing raw XHTML files on iOS devices
Missing agentk request validation could cause KAS to panic
Discovery 2024-06-12 Entry 2024-06-13 gitlab-ce
gitlab-ee
>= 17.0.0 lt 17.0.2
>= 16.11.0 lt 16.11.4
>= 5.1 lt 16.10.7
CVE-2024-1495
CVE-2024-1736
CVE-2024-1963
CVE-2024-4201
CVE-2024-5469
https://about.gitlab.com/releases/2024/06/12/patch-release-gitlab-17-0-2-released/
|
8fc615cc-8a66-11e8-8c75-d8cb8abf62dd | Gitlab -- Remote Code Execution Vulnerability in GitLab Projects Import
Gitlab reports:
Remote Code Execution Vulnerability in GitLab Projects Import
Discovery 2018-07-17 Entry 2018-07-18 gitlab-ce
gitlab
>= 11.0.0 lt 11.0.4
>= 10.8.0 lt 10.8.6
>= 8.9.0 lt 10.7.7
CVE-2018-14364
https://about.gitlab.com/2018/07/17/critical-security-release-gitlab-11-dot-0-dot-4-released/
|
dc0c201c-31da-11e8-ac53-d8cb8abf62dd | Gitlab -- multiple vulnerabilities
GitLab reports:
SSRF in services and web hooks
There were multiple server-side request forgery issues in the Services feature.
An attacker could make requests to servers within the same network of the GitLab
instance. This could lead to information disclosure, authentication bypass, or
potentially code execution. This issue has been assigned
CVE-2018-8801.
Gitlab Auth0 integration issue
There was an issue with the GitLab omniauth-auth0 configuration
which resulted in the Auth0 integration signing in the wrong users.
Discovery 2018-03-20 Entry 2018-03-27 Modified 2018-04-07 gitlab
>= 10.5.0 lt 10.5.6
>= 10.4.0 lt 10.4.6
>= 8.3 lt 10.3.9
CVE-2018-8801
https://about.gitlab.com/2018/03/20/critical-security-release-gitlab-10-dot-5-dot-6-released/
|
b950a83b-789e-11e8-8545-d8cb8abf62dd | Gitlab -- multiple vulnerabilities
Gitlab reports:
Wiki XSS
Sanitize gem updates
XSS in url_for(params)
Content injection via username
Activity feed publicly displaying internal project names
Persistent XSS in charts
Discovery 2018-06-25 Entry 2018-06-25 gitlab
>= 11.0.0 lt 11.0.1
>= 10.8.0 lt 10.8.5
>= 4.1 lt 10.7.6
CVE-2018-12606
CVE-2018-3740
CVE-2018-12605
CVE-2018-12607
https://about.gitlab.com/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/
|
418c172b-b96f-11e7-b627-d43d7e971a1b | GitLab -- multiple vulnerabilities
GitLab reports:
Cross-Site Scripting (XSS) vulnerability in the Markdown sanitization
filter
Yasin Soliman via HackerOne reported a Cross-Site Scripting (XSS)
vulnerability in the GitLab markdown sanitization filter. The sanitization
filter was not properly stripping invalid characters from URL schemes and
was therefore vulnerable to persistent XSS attacks anywhere Markdown was
supported.
Cross-Site Scripting (XSS) vulnerability in search bar
Josh Unger reported a Cross-Site Scripting (XSS) vulnerability in the
issue search bar. Usernames were not being properly HTML escaped inside the
author filter would could allow arbitrary script execution.
Open redirect in repository git redirects
Eric Rafaloff via HackerOne reported that GitLab was vulnerable to an
open redirect vulnerability when redirecting requests for repository names
that include the git extension. GitLab was not properly removing dangerous
parameters from the params field before redirecting which could allow an
attacker to redirect users to arbitrary hosts.
Username changes could leave repositories behind
An internal code review discovered that a bug in the code that moves
repositories during a username change could potentially leave behind
projects, allowing an attacker who knows the previous username to
potentially steal the contents of repositories on instances that are not
configured with hashed namespaces.
Discovery 2017-10-17 Entry 2017-10-25 gitlab
>= 2.8.0 le 9.4.6
>= 9.5.0 le 9.5.8
>= 10.0.0 le 10.0.3
https://about.gitlab.com/2017/10/17/gitlab-10-dot-0-dot-4-security-release/
|
085a087b-3897-11e8-ac53-d8cb8abf62dd | Gitlab -- multiple vulnerabilities
GitLab reports:
Confidential issue comments in Slack, Mattermost, and webhook integrations.
Persistent XSS in milestones data-milestone-id.
Persistent XSS in filename of merge request.
Discovery 2018-04-04 Entry 2018-04-05 gitlab
>= 10.6.0 lt 10.6.3
>= 10.5.0 lt 10.5.7
>= 8.6 lt 10.4.7
https://about.gitlab.com/2018/04/04/security-release-gitlab-10-dot-6-dot-3-released/
|
49ef501c-62b6-11ef-bba5-2cf05da270f3 | Gitlab -- vulnerabilities
Gitlab reports:
The GitLab Web Interface Does Not Guarantee Information Integrity When Downloading Source Code from Releases
Denial of Service by importing maliciously crafted GitHub repository
Prompt injection in "Resolve Vulnerabilty" results in arbitrary command execution in victim's pipeline
An unauthorized user can perform certain actions through GraphQL after a group owner enables IP restrictions
Discovery 2024-08-21 Entry 2024-08-25 gitlab-ce
gitlab-ee
>= 17.3.0 lt 17.3.1
>= 17.2.0 lt 17.2.4
>= 8.2.0 lt 17.1.6
CVE-2024-6502
CVE-2024-8041
CVE-2024-7110
CVE-2024-3127
https://about.gitlab.com/releases/2024/08/21/patch-release-gitlab-17-3-1-released/
|