VuXML ID | Description |
4c26f668-0fd2-11ed-a83d-001b217b3468 | Gitlab -- multiple vulnerabilities
Gitlab reports:
Revoke access to confidential notes todos
Pipeline subscriptions trigger new pipelines with the wrong author
Ability to gain access to private project through an email invite by using other user's email address as an unverified secondary email
Import via git protocol allows to bypass checks on repository
Unauthenticated IP allowlist bypass when accessing job artifacts through GitLab Pages
Maintainer can leak Packagist and other integration access tokens by changing integration URL
Unauthenticated access to victims Grafana datasources through path traversal
Unauthorized users can filter issues by contact and organization
Malicious Maintainer may change the visibility of project or a group
Stored XSS in job error messages
Enforced group MFA can be bypassed when using Resource Owner Password Credentials grant
Non project members can view public project's Deploy Keys
IDOR in project with Jira integration leaks project owner's other projects Jira issues
Group Bot Users and Tokens not deleted after group deletion
Email invited members can join projects even after the member lock has been enabled
Datadog integration returns user emails
Discovery 2022-07-28 Entry 2022-07-30 gitlab-ce
ge 15.2.0 lt 15.2.1
ge 15.1.0 lt 15.1.4
ge 0 lt 15.0.5
CVE-2022-2512
CVE-2022-2498
CVE-2022-2326
CVE-2022-2417
CVE-2022-2501
CVE-2022-2497
CVE-2022-2531
CVE-2022-2539
CVE-2022-2456
CVE-2022-2500
CVE-2022-2303
CVE-2022-2095
CVE-2022-2499
CVE-2022-2307
CVE-2022-2459
CVE-2022-2534
https://about.gitlab.com/releases/2022/07/28/security-release-gitlab-15-2-1-released/
|
89fdbd85-ebd2-11ed-9c88-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Malicious Runner Attachment via GraphQL
Discovery 2023-05-05 Entry 2023-05-06 gitlab-ce
ge 15.11.0 lt 15.11.2
ge 15.10.0 lt 15.10.6
ge 9.0 lt 15.9.7
CVE-2023-2478
https://about.gitlab.com/releases/2023/05/05/critical-security-release-gitlab-15-11-2-released/
|
fa239535-30f6-11ee-aef9-001b217b3468 | Gitlab -- Vulnerabilities
Gitlab reports:
ReDoS via ProjectReferenceFilter in any Markdown fields
ReDoS via AutolinkFilter in any Markdown fields
Regex DoS in Harbor Registry search
Arbitrary read of files owned by the "git" user via malicious tar.gz file upload using GitLab export functionality
Stored XSS in Web IDE Beta via crafted URL
securityPolicyProjectAssign mutation does not authorize security policy project ID
An attacker can run pipeline jobs as arbitrary user
Possible Pages Unique Domain Overwrite
Access tokens may have been logged when a query was made to an endpoint
Reflected XSS via PlantUML diagram
The main branch of a repository with a specially designed name may allow an attacker to create repositories with malicious code
Invalid 'start_sha' value on merge requests page may lead to Denial of Service
Developers can create pipeline schedules on protected branches even if they don't have access to merge
Potential DOS due to lack of pagination while loading license data
Leaking emails of newly created users
Discovery 2023-08-01 Entry 2023-08-02 gitlab-ce
ge 16.2.0 lt 16.2.2
ge 16.1.0 lt 16.1.3
ge 9.3.0 lt 16.0.8
CVE-2023-3994
CVE-2023-3364
CVE-2023-0632
CVE-2023-3385
CVE-2023-2164
CVE-2023-4002
CVE-2023-4008
CVE-2023-3993
CVE-2023-3500
CVE-2023-3401
CVE-2023-3900
CVE-2023-2022
CVE-2023-4011
CVE-2023-1210
https://about.gitlab.com/releases/2023/08/01/security-release-gitlab-16-2-2-released/
|
6c22bb39-0a9a-11ec-a265-001b217b3468 | Gitlab -- Vulnerabilities
Gitlab reports:
Stored XSS in DataDog Integration
Invited group members continue to have project access even after invited group is deleted
Specially crafted requests to apollo_upload_server middleware leads to denial of service
Privilege escalation of an external user through project token
Missing access control allows non-admin users to add/remove Jira Connect Namespaces
User enumeration on private instances
Member e-mails can be revealed via project import/export feature
Stored XSS in Jira integration
Stored XSS in markdown via the Design reference
Discovery 2021-08-31 Entry 2021-08-31 gitlab-ce
ge 14.2.0 lt 14.2.2
ge 14.1.0 lt 14.1.4
ge 0 lt 14.0.9
CVE-2021-22257
CVE-2021-22258
CVE-2021-22238
https://about.gitlab.com/releases/2021/08/31/security-release-gitlab-14-2-2-released/
|
1fb13175-ed52-11ea-8b93-001b217b3468 | Gitlab -- multiple vulnerabilities
Gitlab reports:
Vendor Cross-Account Assume-Role Attack
Stored XSS on the Vulnerability Page
Outdated Job Token Can Be Reused to Access Unauthorized Resources
File Disclosure Via Workhorse File Upload Bypass
Unauthorized Maintainer Can Edit Group Badge
Denial of Service Within Wiki Functionality
Sign-in Vulnerable to Brute-force Attacks
Invalidated Session Allows Account Access With an Old Password
GitLab Omniauth Endpoint Renders User Controlled Messages
Blind SSRF Through Repository Mirroring
Information Disclosure Through Incorrect Group Permission Verifications
No Rate Limit on GitLab Webhook Feature
GitLab Session Revocation Feature Does Not Invalidate All Sessions
OAuth Authorization Scope for an External Application Can Be Changed Without User Consent
Unauthorized Maintainer Can Delete Repository
Improper Verification of Deploy-Key Leads to Access Restricted Repository
Disabled Repository Still Accessible With a Deploy-Token
Duplicated Secret Code Generated by 2 Factor Authentication Mechanism
Lack of Validation Within Project Invitation Flow
Current Sessions Not Invalidated Upon Enabling 2 Factor Authentication
Users Without 2 Factor Authentication Can Be Blocked Accessing GitLab
Lack of Upper Bound Check Leading to Possible Denial of Service
2 Factor Authentication for Groups Was Not Enforced Within API Endpoint
GitLab Runner Denial of Service via CI Jobs
Update jQuery Dependency
Discovery 2020-09-02 Entry 2020-09-02 gitlab-ce
ge 13.3.0 lt 13.3.4
ge 13.2.0 lt 13.2.8
ge 0 lt 13.1.10
https://about.gitlab.com/releases/2020/09/02/security-release-gitlab-13-3-3-released/
CVE-2020-13318
CVE-2020-13301
CVE-2020-13284
CVE-2020-13298
CVE-2020-13313
CVE-2020-13311
CVE-2020-13289
CVE-2020-13302
CVE-2020-13314
CVE-2020-13309
CVE-2020-13287
CVE-2020-13306
CVE-2020-13299
CVE-2020-13300
CVE-2020-13317
CVE-2020-13303
CVE-2020-13316
CVE-2020-13304
CVE-2020-13305
CVE-2020-13307
CVE-2020-13308
CVE-2020-13315
CVE-2020-13297
CVE-2020-13310
CVE-2020-11022
|
fb6e53ae-9df6-11eb-ba8c-001b217b3468 | Gitlab -- Vulnerabilities
SO-AND-SO reports:
Remote code execution when uploading specially crafted image files
Update Rexml
Discovery 2021-04-14 Entry 2021-04-15 gitlab-ce
ge 13.10.0 lt 13.10.3
ge 13.9.0 lt 13.9.6
ge 7.12 lt 13.8.8
https://about.gitlab.com/releases/2021/04/14/security-release-gitlab-13-10-3-released/
CVE-2021-28965
|
e8483115-8b8e-11ea-bdcf-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Path Traversal in NuGet Package Registry
Workhorse Bypass Leads to File Disclosure
OAuth Application Client Secrets Revealed
Code Owners Approval Rules Are Not Updated for Existing Merge Requests When Source Branch Changes
Code Owners Protection Not Enforced from Web UI
Repository Mirror Passwords Exposed To Maintainers
Admin Audit Log Page Denial of Service
Private Project ID Revealed Through Group API
Elasticsearch Credentials Logged to ELK
GitHub Personal Access Token Exposed on Integrations Page
Update Nokogiri dependency
Update OpenSSL Dependency
Update git
Discovery 2020-04-30 Entry 2020-05-01 gitlab-ce
ge 12.10.0 lt 12.10.2
ge 12.9.0 lt 12.9.5
ge 8.4.0 lt 12.8.10
https://about.gitlab.com/releases/2020/04/30/security-release-12-10-2-released/
CVE-2020-12448
CVE-2020-10187
CVE-2020-7595
CVE-2020-1967
CVE-2020-11008
|
a3495e61-047f-11eb-86ea-001b217b3468 | Gitlab -- multiple vulnerabilities
Gitlab reports:
Potential Denial Of Service Via Update Release Links API
Insecure Storage of Session Key In Redis
Improper Access Expiration Date Validation
Cross-Site Scripting in Multiple Pages
Unauthorized Users Can View Custom Project Template
Cross-Site Scripting in SVG Image Preview
Incomplete Handling in Account Deletion
Insufficient Rate Limiting at Re-Sending Confirmation Email
Improper Type Check in GraphQL
To-dos Are Not Redacted When Membership Changes
Guest users can modify confidentiality attribute
Command injection on runner host
Insecure Runner Configuration in Kubernetes Environments
Discovery 2020-10-01 Entry 2020-10-02 gitlab-ce
ge 13.4.0 lt 13.4.2
ge 13.3.0 lt 13.3.7
ge 7.12 lt 13.2.10
https://about.gitlab.com/releases/2020/10/01/security-release-13-4-2-release/
CVE-2020-13333
CVE-2020-13332
CVE-2020-13335
CVE-2020-13334
CVE-2020-13327
|
8a0cd618-22a0-11ed-b1e7-001b217b3468 | Gitlab -- Remote Code Execution
Gitlab reports:
Remote Command Execution via Github import
Discovery 2022-08-22 Entry 2022-08-23 gitlab-ce
ge 15.3.0 lt 15.3.1
ge 15.2.0 lt 15.2.3
ge 11.3.4 lt 15.1.5
CVE-2022-2884
https://about.gitlab.com/releases/2022/08/22/critical-security-release-gitlab-15-3-1-released/
|
570706ff-7ee0-11ea-bd0b-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
NuGet Package and File Disclosure through GitLab Workhorse
Job Artifact Uploads and File Disclosure through GitLab Workhorse
Incorrect membership following group removal
Logging of Praefect tokens
Update Rack dependency
Update OpenSSL dependency
Discovery 2020-04-14 Entry 2020-04-15 gitlab-ce
ge 12.9.0 lt 12.9.3
ge 12.8.0 lt 12.8.9
ge 0 lt 12.7.9
https://about.gitlab.com/releases/2020/04/14/critical-security-release-gitlab-12-dot-9-dot-3-released/
CVE-2020-11505
CVE-2020-11506
CVE-2020-11649
CVE-2020-16782
|
3cde510a-7135-11ed-a28b-bff032704f00 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
DAST API scanner exposes Authorization headers in vulnerabilities
Group IP allow-list not fully respected by the Package Registry
Deploy keys and tokens may bypass External Authorization service if it is enabled
Repository import still allows to import 40 hexadecimal branches
Webhook secret tokens leaked in webhook logs
Maintainer can leak webhook secret token by changing the webhook URL
Cross-site scripting in Jira Integration affecting self-hosted instances without strict CSP
Release names visible in public projects despite release set as project members only
Sidekiq background job DoS by uploading malicious NuGet packages
SSRF in Web Terminal advertise_address
Discovery 2022-11-30 Entry 2022-12-01 gitlab-ce
ge 15.6.0 lt 15.6.1
ge 15.5.0 lt 15.5.5
ge 9.3.0 lt 15.4.6
CVE-2022-4206
CVE-2022-3820
CVE-2022-3740
CVE-2022-4205
CVE-2022-3902
CVE-2022-4054
CVE-2022-3572
CVE-2022-3482
CVE-2022-3478
CVE-2022-4201
https://about.gitlab.com/releases/2022/11/30/security-release-gitlab-15-6-1-released/
|
3507bfb3-85d5-11ec-8c9c-001b217b3468 | Gitlab -- multiple vulnerabilities
Gitlab reports:
Arbitrary POST requests via special HTML attributes in Jupyter Notebooks
DNS Rebinding vulnerability in Irker IRC Gateway integration
Missing certificate validation for external CI services
Blind SSRF Through Project Import
Open redirect vulnerability in Jira Integration
Issue link was disclosing the linked issue
Service desk email accessible by project non-members
Authenticated users can search other users by their private email
"External status checks" can be accepted by users below developer access if the user is either author or assignee of the target merge request
Deleting packages in bulk from package registries may cause table locks
Autocomplete enabled on specific pages
Possible SSRF due to not blocking shared address space
System notes reveals private project path when Issue is moved to a public project
Timeout for pages using Markdown
Certain branch names could not be protected
Discovery 2022-02-03 Entry 2022-02-04 gitlab-ce
ge 14.7.0 lt 14.7.1
ge 14.6.0 lt 14.6.4
ge 0 lt 14.5.4
CVE-2022-0427
CVE-2022-0425
CVE-2022-0123
CVE-2022-0136
CVE-2022-0283
CVE-2022-0390
CVE-2022-0373
CVE-2022-0371
CVE-2021-39943
CVE-2022-0477
CVE-2022-0167
CVE-2022-0249
CVE-2022-0344
CVE-2022-0488
CVE-2021-39931
https://about.gitlab.com/releases/2022/02/03/security-release-gitlab-14-7-1-released/
|
1020d401-6d2d-11eb-ab0b-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Improper Certificate Validation for Fortinet OTP
Denial of Service Attack on gitlab-shell
Resource exhaustion due to pending jobs
Confidential issue titles were exposed
Improper access control allowed demoted project members to access authored merge requests
Improper access control allowed unauthorized users to access analytic pages
Unauthenticated CI lint API may lead to information disclosure and SSRF
Prometheus integration in Gitlab may lead to SSRF
Discovery 2021-02-11 Entry 2021-02-12 gitlab-ce
ge 13.8.0 lt 13.8.4
ge 13.7.0 lt 13.7.7
ge 10.5 lt 13.6.7
https://about.gitlab.com/releases/2021/02/11/security-release-gitlab-13-8-4-released/
|
aaea7b7c-4887-11ee-b164-001b217b3468 | Gitlab -- Vulnerabilities
Gitlab reports:
Privilege escalation of "external user" to internal access through group service account
Maintainer can leak sentry token by changing the configured URL (fix bypass)
Google Cloud Logging private key showed in plain text in GitLab UI leaking to other group owners
Information disclosure via project import endpoint
Developer can leak DAST scanners "Site Profile" request headers and auth password
Project forking outside current group
User is capable of creating Model experiment and updating existing run's status in public project
ReDoS in bulk import API
Pagination for Branches and Tags can be skipped leading to DoS
Internal Open Redirection Due to Improper handling of "../" characters
Subgroup Member With Reporter Role Can Edit Group Labels
Banned user can delete package registries
Discovery 2023-08-31 Entry 2023-09-01 gitlab-ce
ge 16.3.0 lt 16.3.1
ge 16.2.0 lt 16.2.5
ge 4.1.0 lt 16.1.5
CVE-2023-3915
CVE-2023-4378
CVE-2023-3950
CVE-2023-4630
CVE-2022-4343
CVE-2023-4638
CVE-2023-4018
CVE-2023-3205
CVE-2023-4647
CVE-2023-1279
CVE-2023-0120
CVE-2023-1555
https://about.gitlab.com/releases/2023/08/31/security-release-gitlab-16-3-1-released/
|
518a119c-a864-11eb-8ddb-001b217b3468 | Gitlab -- Vulnerabilities
Gitlab reports:
Read API scoped tokens can execute mutations
Pull mirror credentials were exposed
Denial of Service when querying repository branches API
Non-owners can set system_note_timestamp when creating / updating issues
DeployToken will impersonate a User with the same ID when using Dependency Proxy
Discovery 2021-04-28 Entry 2021-04-28 gitlab-ce
ge 13.11.0 lt 13.11.2
ge 13.10.0 lt 13.10.4
ge 11.6.0 lt 13.9.7
https://about.gitlab.com/releases/2021/04/28/security-release-gitlab-13-11-2-released/
CVE-2021-22209
CVE-2021-22206
CVE-2021-22210
CVE-2021-22208
CVE-2021-22211
|
04422df1-40d8-11ed-9be7-454b1dd82c64 | Gitlab -- Multiple vulnerabilities
Gitlab reports:
Denial of Service via cloning an issue
Arbitrary PUT request as victim user through Sentry error list
Content injection via External Status Checks
Project maintainers can access Datadog API Key from logs
Unsafe serialization of Json data could lead to sensitive data leakage
Import bug allows importing of private local git repos
Maintainer can leak Github access tokens by changing integration URL (even after 15.2.1 patch)
Unauthorized users able to create issues in any project
Bypass group IP restriction on Dependency Proxy
Healthcheck endpoint allow list can be bypassed when accessed over HTTP in an HTTPS enabled system
Disclosure of Todo details to guest users
A user's primary email may be disclosed through group member events webhooks
Content manipulation due to branch/tag name confusion with the default branch name
Leakage of email addresses in WebHook logs
Specially crafted output makes job logs inaccessible
Enforce editing approval rules on project level
Discovery 2022-09-29 Entry 2022-09-30 gitlab-ce
ge 15.4.0 lt 15.4.1
ge 15.3.0 lt 15.3.4
ge 9.3.0 lt 15.2.5
CVE-2022-3293
CVE-2022-3279
CVE-2022-3325
https://about.gitlab.com/releases/2022/09/29/security-release-gitlab-15-4-1-released/
CVE-2022-3283
CVE-2022-3060
CVE-2022-2904
CVE-2022-3018
CVE-2022-3291
CVE-2022-3067
CVE-2022-2882
CVE-2022-3066
CVE-2022-3286
CVE-2022-3285
CVE-2022-3330
CVE-2022-3351
CVE-2022-3288
|
0a305431-bc98-11ea-a051-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Missing Permission Check on Time Tracking
Cross-Site Scripting in PyPi Files API
Insecure Authorization Check on Private Project Security Dashboard
Cross-Site Scripting in References
Cross-Site Scripting in Group Names
Cross-Site Scripting in Blob Viewer
Cross-Site Scripting in Error Tracking
Insecure Authorisation Check on Creation and Deletion of Deploy Tokens
User Name Format Restiction Bypass
Denial of Service in Issue Comments
Cross-Site Scripting in Wiki Pages
Private Merge Request Updates Leaked via Todos
Private User Activity Leaked via API
Cross-Site Scripting in Bitbucket Import Feature
Github Project Restriction Bypass
Update PCRE Dependency
Update Kaminari Gem
Cross-Site Scripting in User Profile
Update Xterm.js
Discovery 2020-07-01 Entry 2020-07-02 gitlab-ce
ge 13.1.0 lt 13.1.2
ge 13.0.0 lt 13.0.8
ge 0 lt 12.10.13
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
CVE-2020-14155
CVE-2020-11082
CVE-2019-0542
|
4ffcccae-e924-11ed-9c88-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Privilege escalation for external users when OIDC is enabled under certain conditions
Account takeover through open redirect for Group SAML accounts
Users on banned IP addresses can still commit to projects
User with developer role (group) can modify Protected branches setting on imported project and leak group CI/CD variables
The Gitlab web interface does not guarantee file integrity when downloading source code or installation packages from a tag or from a release.
Banned group member continues to have access to the public projects of a public group with the access level as same as before the ban.
The main branch of a repository with a specially designed name allows an attacker to create repositories with malicious code.
XSS and content injection and iframe injection when viewing raw files on iOS devices
Authenticated users can find other users by their private email
Discovery 2023-05-02 Entry 2023-05-02 gitlab-ce
ge 15.11.0 lt 15.11.1
ge 15.10.0 lt 15.10.5
ge 9.0 lt 15.9.6
CVE-2023-2182
CVE-2023-1965
CVE-2023-1621
CVE-2023-2069
CVE-2023-1178
CVE-2023-0805
CVE-2023-0756
CVE-2023-1836
CVE-2022-4376
https://about.gitlab.com/releases/2023/05/02/security-release-gitlab-15-11-1-released/
|
4a08a4fb-f152-11ed-9c88-001b217b3468 | Gitlab -- Vulnerability
Gitlab reports:
Smuggling code changes via merge requests with refs/replace
Discovery 2023-05-10 Entry 2023-05-13 gitlab-ce
ge 15.11.0 lt 15.11.3
ge 15.10.0 lt 15.10.7
ge 9.0 lt 15.9.8
CVE-2023-2181
https://about.gitlab.com/releases/2023/05/10/security-release-gitlab-15-11-3-released/
|
e2fb85ce-9a3c-11ee-af26-001b217b3468 | Gitlab -- vulnerabilities
Gitlab reports:
Smartcard authentication allows impersonation of arbitrary user using user's public certificate
When subgroup is allowed to merge or push to protected branches, subgroup members with the Developer role may gain the ability to push or merge
The GitLab web interface does not ensure the integrity of information when downloading the source code from installation packages or tags
Project maintainer can escalate to Project owner using project access token rotate API
Omission of Double Encoding in File Names Facilitates the Creation of Repositories with Malicious Content
Unvalidated timeSpent value leads to unable to load issues on Issue board
Developer can bypass predefined variables via REST API
Auditor users can create merge requests on projects they don't have access to
Discovery 2023-12-13 Entry 2023-12-14 gitlab-ce
ge 16.6.0 lt 16.6.2
ge 16.5.0 lt 16.5.4
ge 8.17.0 lt 16.4.4
CVE-2023-6680
CVE-2023-6564
CVE-2023-6051
CVE-2023-3907
CVE-2023-5512
CVE-2023-3904
CVE-2023-5061
CVE-2023-3511
https://about.gitlab.com/releases/2023/12/13/security-release-gitlab-16-6-2-released/
|
03bf5157-d145-11ee-acee-001b217b3468 | Gitlab -- Vulnerabilities
Gitlab reports:
Stored-XSS in user's profile page
User with "admin_group_members" permission can invite other groups to gain owner access
ReDoS issue in the Codeowners reference extractor
LDAP user can reset password using secondary email and login using direct authentication
Bypassing group ip restriction settings to access environment details of projects through Environments/Operations Dashboard
Users with the Guest role can change Custom dashboard projects settings for projects in the victim group
Group member with sub-maintainer role can change title of shared private deploy keys
Bypassing approvals of CODEOWNERS
Discovery 2024-02-21 Entry 2024-02-22 gitlab-ce
ge 16.9.0 lt 16.9.1
ge 16.8.0 lt 16.8.3
ge 11.3.0 lt 16.7.6
CVE-2024-1451
CVE-2023-6477
CVE-2023-6736
CVE-2024-1525
CVE-2023-4895
CVE-2024-0861
CVE-2023-3509
CVE-2024-0410
https://about.gitlab.com/releases/2024/02/21/security-release-gitlab-16-9-1-released/
|
dad6294c-f7c1-11ee-bb77-001b217b3468 | Gitlab -- Patch Release: 16.10.2, 16.9.4, 16.8.6
Gitlab reports:
Stored XSS injected in diff viewer
Stored XSS via autocomplete results
Redos on Integrations Chat Messages
Redos During Parse Junit Test Report
Discovery 2024-04-10 Entry 2024-04-11 gitlab-ce
ge 16.10.0 lt 16.10.2
ge 16.9.0 lt 16.9.4
< 16.8.6
CVE-2024-3092
CVE-2024-2279
CVE-2023-6489
CVE-2023-6678
https://about.gitlab.com/releases/2024/04/10/patch-release-gitlab-16-10-2-released/
|
0a8ebf4a-5660-11eb-b4e2-001b217b3468 | Gitlab -- vulnerability
SO-AND-SO reports:
Ability to steal a user's API access token through GitLab Pages
Discovery 2021-01-14 Entry 2021-01-14 gitlab-ce
ge 13.7.0 lt 13.7.4
ge 13.6.0 lt 13.6.5
ge 12.2 lt 13.5.7
https://about.gitlab.com/releases/2021/01/14/critical-security-release-gitlab-13-7-4-released/
|
b857606c-0266-11ef-8681-001b217b3468 | Gitlab -- vulnerabilities
Gitlab reports:
GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
Path Traversal leads to DoS and Restricted File Read
Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
Personal Access Token scopes not honoured by GraphQL subscriptions
Domain based restrictions bypass using a crafted email address
Discovery 2024-04-24 Entry 2024-04-24 gitlab-ce
gitlab-ee
ge 16.11.0 lt 16.11.1
ge 16.10.0 lt 16.10.4
ge 7.8.0 lt 16.9.6
CVE-2024-4024
CVE-2024-2434
CVE-2024-2829
CVE-2024-4006
CVE-2024-1347
https://about.gitlab.com/releases/2024/04/24/patch-release-gitlab-16-11-1-released/
|
a003b74f-d7b3-11ea-9df1-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Arbitrary File Read when Moving an Issue
Memory Exhaustion via Excessive Logging of Invite Email Error
Denial of Service Through Project Import Feature
User Controlled Git Configuration Settings Resulting in SSRF
Stored XSS in Issue Reference Number Tooltip
Stored XSS in Issues List via Milestone Title
Improper Access Control After Group Transfer
Bypass Email Verification Required for OAuth Flow
Confusion When Using Hexadecimal Branch Names
Insufficient OAuth Revocation
Improper Access Control for Project Sharing
Stored XSS in Jobs Page
Improper Access Control of Applications Page
SSRF into Shared Runner
Update Kramdown Gem
Discovery 2020-08-05 Entry 2020-08-06 Modified 2020-08-25 gitlab-ce
< 13.3.0
https://about.gitlab.com/releases/2020/08/05/gitlab-13-2-3-released/
CVE-2020-10977
CVE-2020-13280
CVE-2020-13281
CVE-2020-14001
|
174e466b-1d48-11eb-bd0f-001b217b3468 | Gitlab -- Multiple vulnerabilities
Gitlab reports:
Path Traversal in LFS Upload
Path traversal allows saving packages in arbitrary location
Kubernetes agent API leaks private repos
Terraform state deletion API exposes object storage URL
Stored-XSS in error message of build-dependencies
Git credentials persisted on disk
Potential Denial of service via container registry
Info leak when group is transferred from private to public group
Limited File Disclosure Via Multipart Bypass
Unauthorized user is able to access scheduled pipeline variables and values
CSRF in runner administration page allows an attacker to pause/resume runners
Regex backtracking attack in path parsing of Advanced Search result
Bypass of required CODEOWNERS approval
SAST CiConfiguration information visible without permissions
Discovery 2020-11-02 Entry 2020-11-02 gitlab-ce
ge 13.5.0 lt 13.5.2
ge 13.4.0 lt 13.4.5
ge 8.8.9 lt 13.3.9
https://about.gitlab.com/releases/2020/11/02/security-release-gitlab-13-5-2-released/
CVE-2020-13355
CVE-2020-26405
CVE-2020-13358
CVE-2020-13359
CVE-2020-13340
CVE-2020-13353
CVE-2020-13354
CVE-2020-13352
CVE-2020-13356
CVE-2020-13351
CVE-2020-13350
CVE-2020-13349
CVE-2020-13348
|
e6b994e2-2891-11ed-9be7-454b1dd82c64 | Gitlab -- multiple vulnerabilities
Gitlab reports:
Remote Command Execution via GitHub import
Stored XSS via labels color
Content injection via Incidents Timeline description
Lack of length validation in Snippets leads to Denial of Service
Group IP allow-list not fully respected by the Package Registry
Abusing Gitaly.GetTreeEntries calls leads to denial of service
Arbitrary HTTP Requests Possible in .ipynb Notebook with Malicious Form Tags
Regular Expression Denial of Service via special crafted input
Information Disclosure via Arbitrary GFM references rendered in Incident Timeline Events
Regex backtracking through the Commit message field
Read repository content via LivePreview feature
Denial of Service via the Create branch API
Denial of Service via Issue preview
IDOR in Zentao integration leaked issue details
Brute force attack may guess a password even when 2FA is enabled
Discovery 2022-08-30 Entry 2022-08-30 gitlab-ce
ge 15.3.0 lt 15.3.2
ge 15.2.0 lt 15.2.4
ge 10.0.0 lt 15.1.6
CVE-2022-2992
CVE-2022-2865
CVE-2022-2527
CVE-2022-2592
CVE-2022-2533
CVE-2022-2455
CVE-2022-2428
CVE-2022-2908
CVE-2022-2630
CVE-2022-2931
CVE-2022-2907
CVE-2022-3031
https://about.gitlab.com/releases/2022/08/30/critical-security-release-gitlab-15-3-2-released/
|
1d651770-f4f5-11eb-ba49-001b217b3468 | Gitlab -- Gitlab
Gitlab reports:
Stored XSS in Mermaid when viewing Markdown files
Stored XSS in default branch name
Perform Git actions with an impersonation token even if impersonation is disabled
Tag and branch name confusion allows Developer to access protected CI variables
New subscriptions generate OAuth tokens on an incorrect OAuth client application
Ability to list and delete impersonation tokens for your own user
Pipelines page is partially visible for users that have no right to see CI/CD
Improper email validation on an invite URL
Unauthorised user was able to add meta data upon issue creation
Unauthorized user can trigger deployment to a protected environment
Guest in private project can see CI/CD Analytics
Guest users can create issues for Sentry errors and track their status
Private user email disclosure via group invitation
Projects are allowed to add members with email address domain that should be blocked by group settings
Misleading username could lead to impersonation in using SSH Certificates
Unauthorized user is able to access and view project vulnerability reports
Denial of service in repository caused by malformed commit author
Discovery 2021-08-03 Entry 2021-08-04 gitlab-ce
ge 14.1.0 lt 14.1.2
ge 14.0.0 lt 14.0.7
ge 0 lt 13.12.9
CVE-2021-22237
CVE-2021-22236
CVE-2021-22239
https://about.gitlab.com/releases/2021/08/03/security-release-gitlab-14-1-2-released/
|
08fba28b-6f9f-11ea-bd0b-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Arbitrary File Read when Moving an Issue
Path Traversal in NPM Package Registry
SSRF on Project Import
External Users Can Create Personal Snippet
Triggers Decription Can be Updated by Other Maintainers in Project
Information Disclosure on Confidential Issues Moved to Private Programs
Potential DoS in Repository Archive Download
Blocked Users Can Still Pull/Push Docker Images
Repository Mirroring not Disabled when Feature not Activated
Vulnerability Feedback Page Was Leaking Information on Vulnerabilities
Stored XSS Vulnerability in Admin Feature
Upload Feature Allowed a User to Read Unauthorized Exported Files
Unauthorized Users Are Able to See CI Metrics
Last Pipeline Status of a Merge Request Leaked
Blind SSRF on FogBugz
Update Nokogiri dependency
Discovery 2020-03-26 Entry 2020-03-26 gitlab-ce
ge 12.9.0 lt 12.9.1
ge 12.8.0 lt 12.8.8
ge 0 lt 12.7.8
https://about.gitlab.com/releases/2020/03/26/security-release-12-dot-9-dot-1-released/
CVE-2020-10953
CVE-2020-10956
CVE-2020-10954
CVE-2020-10952
CVE-2020-10955
CVE-2020-9795
|
16f7ec68-5cce-11ed-9be7-454b1dd82c64 | Gitlab -- Multiple vulnerabilities
Gitlab reports:
DAST analyzer sends custom request headers with every request
Stored-XSS with CSP-bypass via scoped labels' color
Maintainer can leak Datadog API key by changing integration URL
Uncontrolled resource consumption when parsing URLs
Issue HTTP requests when users view an OpenAPI document and click buttons
Command injection in CI jobs via branch name in CI pipelines
Open redirection
Prefill variables do not check permission of the project in external CI config
Disclosure of audit events to insufficiently permissioned group and project members
Arbitrary GFM references rendered in Jira issue description leak private/confidential resources
Award emojis API for an internal note is accessible to users without access to the note
Open redirect in pipeline artifacts when generating HTML documents
Retrying a job in a downstream pipeline allows the retrying user to take ownership of the retried jobs in upstream pipelines
Project-level Secure Files can be written out of the target directory
Discovery 2022-11-02 Entry 2022-11-05 gitlab-ce
ge 15.5.0 lt 15.5.2
ge 15.4.0 lt 15.4.4
ge 9.3.0 lt 15.3.5
CVE-2022-3767
CVE-2022-3265
CVE-2022-3483
CVE-2022-3818
CVE-2022-3726
CVE-2022-2251
CVE-2022-3486
CVE-2022-3793
CVE-2022-3413
CVE-2022-2761
CVE-2022-3819
CVE-2022-3280
CVE-2022-3706
https://about.gitlab.com/releases/2022/11/02/security-release-gitlab-15-5-2-released/
|
2823048d-9f8f-11ec-8c9c-001b217b3468 | Gitlab -- multiple vulnerabilities
Gitlab reports:
Runner registration token disclosure through Quick Actions
Unprivileged users can add other users to groups through an API endpoint
Inaccurate display of Snippet contents can be potentially misleading to users
Environment variables can be leaked via the sendmail delivery method
Unauthenticated user enumeration on GraphQL API
Adding a mirror with SSH credentials can leak password
Denial of Service via user comments
Discovery 2022-02-25 Entry 2022-03-09 gitlab-ce
ge 14.8.0 lt 14.8.2
ge 14.7.0 lt 14.7.4
ge 0 lt 14.6.5
CVE-2022-0735
CVE-2022-0549
CVE-2022-0751
CVE-2022-0741
CVE-2021-4191
CVE-2022-0738
CVE-2022-0489
https://about.gitlab.com/releases/2022/02/25/critical-security-release-gitlab-14-8-2-released/
|
b299417a-5725-11ec-a587-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Group members with developer role can escalate their privilege to maintainer on projects that they import
When user registration is limited, external users that aren't developers shouldn't have access to the CI Lint API
Collision in access memoization leads to potential elevated privileges on groups and projects
Project access token names are returned for unauthenticated requesters
Sensitive info disclosure in logs
Disclosure of a user's custom project and group templates
ReDoS in Maven package version
Potential denial of service via the Diff feature
Regular Expression Denial of Service via user comments
Service desk email accessible by any project member
Regular Expression Denial of Service via quick actions
IDOR in "external status check" API leaks data about any status check on the instance
Default branch name visible in public projects restricting access to the source code repository
Deploy token allows access to disabled project Wiki
Regular Expression Denial of Service via deploy Slash commands
Users can reply to Vulnerability Report discussions despite Only Project Members settings
Unauthorised deletion of protected branches
Author can approve Merge Request after having access revoked
HTML Injection via Swagger UI
Discovery 2021-12-06 Entry 2021-12-07 gitlab-ce
ge 14.5.0 lt 14.5.2
ge 14.4.0 lt 14.4.4
ge 0 lt 14.3.6
CVE-2021-39944
CVE-2021-39935
CVE-2021-39937
CVE-2021-39915
CVE-2021-39919
CVE-2021-39930
CVE-2021-39940
CVE-2021-39932
CVE-2021-39933
CVE-2021-39934
CVE-2021-39917
CVE-2021-39916
CVE-2021-39941
CVE-2021-39936
CVE-2021-39938
CVE-2021-39918
CVE-2021-39931
CVE-2021-39945
CVE-2021-39910
https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/
|
33557582-3958-11ec-90ba-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Stored XSS via ipynb files
Pipeline schedules on imported projects can be set to automatically active after import
Potential Denial of service via Workhorse
Improper Access Control allows Merge Request creator to bypass locked status
Projects API discloses ID and name of private groups
Severity of an incident can be changed by a guest user
System root password accidentally written to log file
Potential DoS via a malformed TIFF image
Bypass of CODEOWNERS Merge Request approval requirement
Change project visibility to a restricted option
Project exports leak external webhook token value
SCIM token is visible after creation
Invited group members, with access inherited from parent group, continue to have project access even after invited subgroup is transfered
Regular expression denial of service issue when cleaning namespace path
Prevent creation of scopeless apps using applications API
Webhook data exposes assignee's private email address
Discovery 2021-10-28 Entry 2021-10-30 gitlab-ce
ge 14.4.0 lt 14.4.1
ge 14.3.0 lt 14.3.4
ge 0 lt 14.2.6
CVE-2021-39906
CVE-2021-39895
CVE-2021-39907
CVE-2021-39904
CVE-2021-39905
CVE-2021-39902
CVE-2021-39913
CVE-2021-39912
CVE-2021-39909
CVE-2021-39903
CVE-2021-39898
CVE-2021-39901
CVE-2021-39897
CVE-2021-39914
CVE-2021-39911
https://about.gitlab.com/releases/2021/10/28/security-release-gitlab-14-4-1-released/
|
54006796-cf7b-11ed-a5d5-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Cross-site scripting in "Maximum page reached" page
Private project guests can read new changes using a fork
Mirror repository error reveals password in Settings UI
DOS and high resource consumption of Prometheus server through abuse of Prometheus integration proxy endpoint
Unauthenticated users can view Environment names from public projects limited to project members only
Copying information to the clipboard could lead to the execution of unexpected commands
Maintainer can leak masked webhook secrets by adding a new parameter to the webhook URL
Arbitrary HTML injection possible when :soft_email_confirmation feature flag is enabled in the latest release
Framing of arbitrary content (leading to open redirects) on any page allowing user controlled markdown
MR for security reports are available to everyone
API timeout when searching for group issues
Unauthorised user can add child epics linked to victim's epic in an unrelated group
GitLab search allows to leak internal notes
Ambiguous branch name exploitation in GitLab
Improper permissions checks for moving an issue
Private project branches names can be leaked through a fork
Discovery 2023-03-30 Entry 2023-03-31 gitlab-ce
ge 15.10.0 lt 15.10.1
ge 15.9.0 lt 15.9.4
ge 8.1 lt 15.8.5
CVE-2022-3513
CVE-2023-0485
CVE-2023-1098
CVE-2023-1733
CVE-2023-0319
CVE-2023-1708
CVE-2023-0838
CVE-2023-0523
CVE-2023-0155
CVE-2023-1167
CVE-2023-1417
CVE-2023-1710
CVE-2023-0450
CVE-2023-1071
CVE-2022-3375
https://about.gitlab.com/releases/2023/03/30/security-release-gitlab-15-10-1-released/
|
1bdd4db6-2223-11ec-91be-001b217b3468 | Gitlab -- vulnerabilities
Gitlab reports:
Stored XSS in merge request creation page
Denial-of-service attack in Markdown parser
Stored Cross-Site Scripting vulnerability in the GitLab Flavored Markdown
DNS Rebinding vulnerability in Gitea importer
Exposure of trigger tokens on project exports
Improper access control for users with expired password
Access tokens are not cleared after impersonation
Reflected Cross-Site Scripting in Jira Integration
DNS Rebinding vulnerability in Fogbugz importer
Access tokens persist after project deletion
User enumeration vulnerability
Potential DOS via API requests
Pending invitations of public groups and public projects are visible to any user
Bypass Disabled Repo by URL Project Creation
Low privileged users can see names of the private groups shared in projects
API discloses sensitive info to low privileged users
Epic listing do not honour group memberships
Insecure Direct Object Reference vulnerability may lead to protected branch names getting disclosed
Low privileged users can import users from projects that they they are not a maintainer on
Potential DOS via dependencies API
Create a project with unlimited repository size through malicious Project Import
Bypass disabled Bitbucket Server import source project creation
Requirement to enforce 2FA is not honored when using git commands
Content spoofing vulnerability
Improper session management in impersonation feature
Create OAuth application with arbitrary scopes through content spoofing
Lack of account lockout on change password functionality
Epic reference was not updated while moved between groups
Missing authentication allows disabling of two-factor authentication
Information disclosure in SendEntry
Discovery 2021-09-30 Entry 2021-09-30 gitlab-ce
ge 14.3.0 lt 14.3.1
ge 14.2.0 lt 14.2.5
ge 0 lt 14.1.7
CVE-2021-39885
CVE-2021-39877
CVE-2021-39887
CVE-2021-39867
CVE-2021-39869
CVE-2021-39872
CVE-2021-39878
CVE-2021-39866
CVE-2021-39882
CVE-2021-39875
CVE-2021-39870
CVE-2021-39884
CVE-2021-39883
CVE-2021-22259
CVE-2021-39868
CVE-2021-39871
CVE-2021-39874
CVE-2021-39873
CVE-2021-39881
CVE-2021-39886
CVE-2021-39879
https://about.gitlab.com/releases/2021/09/30/security-release-gitlab-14-3-1-released/
|
6e0ebb4a-5e75-11ee-a365-001b217b3468 | Gitlab -- vulnerabilities
Attacker can add other projects policy bot as member to their own project and use that bot to trigger pipelines in victims project
Group import allows impersonation of users in CI pipelines
Developers can bypass code owners approval by changing a MR's base branch
Leaking source code of restricted project through a fork
Third party library Consul requires enable-script-checks to be False to enable patch
Service account not deleted when namespace is deleted allowing access to internal projects
Enforce SSO settings bypassed for public projects for Members without identity
Removed project member can write to protected branches
Unauthorised association of CI jobs for Machine Learning experiments
Force pipelines to not have access to protected variables and will likely fail using tags
Maintainer can create a fork relationship between existing projects
Disclosure of masked CI variables via processing CI/CD configuration of forks
Asset Proxy Bypass using non-ASCII character in asset URI
Unauthorized member can gain Allowed to push and merge access and affect integrity of protected branches
Removed Developer can continue editing the source code of a public project
A project reporter can leak owner's Sentry instance projects
Math rendering in markdown can escape container and hijack clicks
Discovery 2023-09-28 Entry 2023-09-29 gitlab-ce
ge 16.4.0 lt 16.4.1
ge 16.3.0 lt 16.3.5
ge 8.15 lt 16.2.8
CVE-2023-5207
CVE-2023-5207
CVE-2023-4379
CVE-2023-3413
CVE-2023-3914
CVE-2023-3115
CVE-2023-5198
CVE-2023-4532
CVE-2023-3917
CVE-2023-3920
CVE-2023-0989
CVE-2023-3906
CVE-2023-4658
CVE-2023-3979
CVE-2023-2233
CVE-2023-3922
https://about.gitlab.com/releases/2023/09/28/security-release-gitlab-16-4-1-released/
|
56abf87b-96ad-11eb-a218-001b217b3468 | Gitlab -- Multiple vulnerabilities
Gitlab reports:
Arbitrary File Read During Project Import
Kroki Arbitrary File Read/Write
Stored Cross-Site-Scripting in merge requests
Access data of an internal project through a public project fork as an anonymous user
Incident metric images can be deleted by any user
Infinite Loop When a User Access a Merge Request
Stored XSS in scoped labels
Admin CSRF in System Hooks Execution Through API
Update OpenSSL dependency
Update PostgreSQL dependency
Discovery 2021-03-31 Entry 2021-04-06 gitlab-ce
ge 13.10.0 lt 13.10.1
ge 13.9.0 lt 13.9.5
ge 9 lt 13.8.7
https://about.gitlab.com/releases/2021/03/31/security-release-gitlab-13-10-1-released/
|
8bf856ea-7df7-11eb-9aad-001b217b3468 | Gitlab -- Multiple vulnerabilities
Gitlab reports:
JWT token leak via Workhorse
Stored XSS in wiki pages
Group Maintainers are able to use the Group CI/CD Variables API
Insecure storage of GitLab session keys
Discovery 2021-03-04 Entry 2021-03-05 gitlab-ce
ge 13.9.0 lt 13.9.2
ge 13.8.0 lt 13.8.5
< 13.7.8
https://about.gitlab.com/releases/2021/03/04/security-release-gitlab-13-9-2-released/
CVE-2021-22185
CVE-2021-22186
|
5d5e5cda-38e6-11eb-bbbf-001b217b3468 | Gitlab -- Multiple vulnerabilities
Gitlab reports:
XSS in Zoom Meeting URL
Limited Information Disclosure in Private Profile
User email exposed via GraphQL endpoint
Group and project membership potentially exposed via GraphQL
Search terms logged in search parameter in rails logs
Un-authorised access to feature flag user list
A specific query on the explore page causes statement timeouts
Exposure of starred projects on private user profiles
Uncontrolled Resource Consumption in any Markdown field using Mermaid
Former group members able to view updates to confidential epics
Update GraphicsMagick dependency
Update GnuPG dependency
Update libxml dependency
Discovery 2020-12-07 Entry 2020-12-07 gitlab-ce
ge 13.6.0 lt 13.6.2
ge 13.5.0 lt 13.5.5
ge 12.2 lt 13.4.9
https://about.gitlab.com/releases/2020/12/07/security-release-gitlab-13-6-2-released/
CVE-2020-26407
CVE-2020-26408
CVE-2020-13357
CVE-2020-26411
CVE-2020-26409
|
a612c25f-788a-11ee-8d57-001b217b3468 | Gitlab -- Vulnerabilities
Gitlab reports:
Disclosure of CI/CD variables using Custom project templates
GitLab omnibus DoS crash via OOM with CI Catalogs
Parsing gitlab-ci.yml with large string via timeout input leads to Denial of Service
DoS - Blocking FIFO files in Tar archives
Titles exposed by service-desk template
Approval on protected environments can be bypassed
Version information disclosure when super_sidebar_logged_out feature flag is enabled
Add abuse detection for search syntax filter pipes
Discovery 2023-10-31 Entry 2023-11-01 gitlab-ce
ge 16.5.0 lt 16.5.1
ge 16.4.0 lt 16.4.2
ge 11.6.0 lt 16.3.6
CVE-2023-3399
CVE-2023-5825
CVE-2023-3909
CVE-2023-3246
CVE-2023-5600
CVE-2023-4700
CVE-2023-5831
https://about.gitlab.com/releases/2023/10/31/security-release-gitlab-16-5-1-16-4-2-16-3-6-released/
|
66d1c277-652a-11eb-bb3f-001b217b3468 | Gitlab -- Multiple vulnerabilities
Gitlab reports:
Stored XSS in merge request
Stored XSS in epic's pages
Sensitive GraphQL variables exposed in structured log
Guest user can see tag names in private projects
Information disclosure via error message
DNS rebinding protection bypass
Validate existence of private project
Discovery 2021-02-01 Entry 2021-02-02 gitlab-ce
ge 13.8.0 lt 13.8.2
ge 13.7.0 lt 13.7.6
ge 11.8 lt 13.6.6
https://about.gitlab.com/blog/2021/02/01/security-release-gitlab-13-8-2-released/
CVE-2021-22172
CVE-2021-22169
|
d1b35142-ff4a-11ec-8be3-001b217b3468 | Gitlab -- multiple vulnerabilities
Gitlab reports:
Remote Command Execution via Project Imports
XSS in ZenTao integration affecting self hosted instances without strict CSP
XSS in project settings page
Unallowed users can read unprotected CI variables
IP allow-list bypass to access Container Registries
2FA status is disclosed to unauthenticated users
CI variables provided to runners outside of a group's restricted IP range
IDOR in sentry issues
Reporters can manage issues in error tracking
Regular Expression Denial of Service via malicious web server responses
Unauthorized read for conan repository
Open redirect vulnerability
Group labels are editable through subproject
Release titles visible for any users if group milestones are associated with any project releases
Restrict membership by email domain bypass
Job information is leaked to users who previously were maintainers via the Runner Jobs API endpoint
Discovery 2022-06-30 Entry 2022-07-09 gitlab-ce
ge 15.1.0 lt 15.1.1
ge 15.0.0 lt 15.0.4
ge 0 lt 14.10.5
CVE-2022-2185
CVE-2022-2235
CVE-2022-2230
CVE-2022-2229
CVE-2022-1983
CVE-2022-1963
CVE-2022-2228
CVE-2022-2243
CVE-2022-2244
CVE-2022-1954
CVE-2022-2270
CVE-2022-2250
CVE-2022-1999
CVE-2022-2281
CVE-2022-1981
CVE-2022-2227
https://about.gitlab.com/releases/2022/06/30/critical-security-release-gitlab-15-1-1-released/
|
40bfab16-a68b-11ea-9ea5-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
CI Token Access Control
Discovery 2020-06-03 Entry 2020-06-04 gitlab-ce
ge 13.0.0 lt 13.0.4
ge 12.10.0 lt 12.10.9
ge 10.6.0 lt 12.9.9
https://about.gitlab.com/releases/2020/06/03/critical-security-release-13-0-4-released/
|
f7c5b3a9-b9fb-11ed-99c6-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Stored XSS via Kroki diagram
Prometheus integration Google IAP details are not hidden, may leak account details from instance/group/project settings
Improper validation of SSO and SCIM tokens while managing groups
Maintainer can leak Datadog API key by changing Datadog site
Clipboard based XSS in the title field of work items
Improper user right checks for personal snippets
Release Description visible in public projects despite release set as project members only
Group integration settings sensitive information exposed to project maintainers
Improve pagination limits for commits
Gitlab Open Redirect Vulnerability
Maintainer may become an Owner of a project
Discovery 2023-03-02 Entry 2023-03-03 gitlab-ce
ge 15.9.0 lt 15.9.2
ge 15.8.0 lt 15.8.4
ge 9.0.0 lt 15.7.8
CVE-2023-0050
CVE-2022-4289
CVE-2022-4331
CVE-2023-0483
CVE-2022-4007
CVE-2022-3758
CVE-2023-0223
CVE-2022-4462
CVE-2023-1072
CVE-2022-3381
CVE-2023-1084
https://about.gitlab.com/releases/2023/03/02/security-release-gitlab-15-9-2-released/
|
b2caae55-dc38-11ee-96dc-001b217b3468 | Gitlab -- Vulnerabilities
Gitlab reports:
Bypassing CODEOWNERS approval allowing to steal protected variables
Guest with manage group access tokens can rotate and see group access token with owner permissions
Discovery 2024-03-06 Entry 2024-03-07 gitlab-ce
ge 16.9.0 lt 16.9.2
ge 16.8.0 lt 16.8.4
ge 11.3.0 lt 16.7.7
CVE-2024-0199
CVE-2024-1299
https://about.gitlab.com/releases/2024/03/06/security-release-gitlab-16-9-2-released/
|
f929b172-369e-11ea-9cdb-001b217b3468 | Gitlab -- Private objects exposed through project import
Gitlab reports:
Private objects exposed through project importi
Discovery 2020-01-13 Entry 2020-01-14 gitlab-ce
ge 12.6.0 lt 12.6.4
ge 12.5.0 lt 12.5.7
ge 8.9.0 lt 12.4.8
https://about.gitlab.com/releases/2020/01/13/critical-security-release-gitlab-12-dot-6-dot-4-released/
CVE-2020-6832
|
62f2182c-5f7a-11ea-abb7-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Directory Traversal to Arbitrary File Read
Account Takeover Through Expired Link
Server Side Request Forgery Through Deprecated Service
Group Two-Factor Authentication Requirement Bypass
Stored XSS in Merge Request Pages
Stored XSS in Merge Request Submission Form
Stored XSS in File View
Stored XSS in Grafana Integration
Contribution Analytics Exposed to Non-members
Incorrect Access Control in Docker Registry via Deploy Tokens
Denial of Service via Permission Checks
Denial of Service in Design For Public Issue
Incorrect Access Control via LFS Import
Unescaped HTML in Header
Private Merge Request Titles Leaked via Widget
Project Namespace Exposed via Vulnerability Feedback Endpoint
Denial of Service Through Recursive Requests
Project Authorization Not Being Updated
Incorrect Permission Level For Group Invites
Disclosure of Private Group Epic Information
User IP Address Exposed via Badge images
Discovery 2020-03-04 Entry 2020-03-06 gitlab-ce
ge 12.8.0 lt 12.8.2
ge 12.7.0 lt 12.7.7
ge 0 lt 12.6.8
https://about.gitlab.com/releases/2020/03/04/gitlab-12-dot-8-dot-2-released/
CVE-2020-8113
|
4c8c2218-b120-11ee-90ec-001b217b3468 | Gitlab -- vulnerabilities
Gitlab reports:
Account Takeover via Password Reset without user interactions
Attacker can abuse Slack/Mattermost integrations to execute slash commands as another user
Bypass CODEOWNERS approval removal
Workspaces able to be created under different root namespace
Commit signature validation ignores headers after signature
Discovery 2024-01-11 Entry 2024-01-12 gitlab-ce
ge 16.7.0 lt 16.7.2
ge 16.6.0 lt 16.6.4
ge 8.13.0 lt 16.5.6
CVE-2023-7028
CVE-2023-5356
CVE-2023-4812
CVE-2023-6955
CVE-2023-2030
https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/
|
f7a97d43-c039-11ea-a051-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Workhorse bypass allows files in /tmp to be read via Maven Repository APIs
Discovery 2020-07-06 Entry 2020-07-07 gitlab-ce
ge 13.1.0 lt 13.1.3
ge 13.0.0 lt 13.0.9
ge 0 lt 12.10.14
https://about.gitlab.com/releases/2020/07/06/critical-security-release-gitlab-13-1-3-released/
CVE-2020-15525
|
8657eedd-b423-11ec-9559-001b217b3468 | Gitlab -- multiple vulnerabilities
Gitlab reports:
Static passwords inadvertently set during OmniAuth-based registration
Stored XSS in notes
Stored XSS on Multi-word milestone reference
Denial of service caused by a specially crafted RDoc file
GitLab Pages access tokens can be reused on multiple domains
GitLab Pages uses default (disabled) server Timeouts and a weak TCP Keep-Alive timeout
Incorrect include in pipeline definition exposes masked CI variables in UI
Regular expression denial of service in release asset link
Latest Commit details from private projects leaked to guest users via Merge Requests
CI/CD analytics are available even when public pipelines are disabled
Absence of limit for the number of tags that can be added to a runner can cause performance issues
Client DoS through rendering crafted comments
Blind SSRF Through Repository Mirroring
Bypass of branch restriction in Asana integration
Readable approval rules by Guest user
Redact InvalidURIError error messages
Project import maps members' created_by_id users based on source user ID
Discovery 2022-03-31 Entry 2022-04-04 gitlab-ce
ge 14.9.0 lt 14.9.2
ge 14.8.0 lt 14.8.5
ge 0 lt 14.7.7
CVE-2022-1162
CVE-2022-1175
CVE-2022-1190
CVE-2022-1185
CVE-2022-1148
CVE-2022-1121
CVE-2022-1120
CVE-2022-1100
CVE-2022-1193
CVE-2022-1105
CVE-2022-1099
CVE-2022-1174
CVE-2022-1188
CVE-2022-0740
CVE-2022-1189
CVE-2022-1157
CVE-2022-1111
https://about.gitlab.com/releases/2022/03/31/critical-security-release-gitlab-14-9-2-released/
|
5f52d646-c31f-11eb-8dcf-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Stealing GitLab OAuth access tokens using XSLeaks in Safari
Denial of service through recursive triggered pipelines
Unauthenticated CI lint API may lead to information disclosure and SSRF
Server-side DoS through rendering crafted Markdown documents
Issue and merge request length limit is not being enforced
Insufficient Expired Password Validation
XSS in blob viewer of notebooks
Logging of Sensitive Information
On-call rotation information exposed when removing a member
Spoofing commit author for signed commits
Enable qsh verification for Atlassian Connect
Discovery 2021-06-01 Entry 2021-06-01 gitlab-ce
ge 13.12.0 lt 13.12.2
ge 13.11.0 lt 13.11.5
ge 7.10.0 lt 13.10.5
CVE-2021-22181
https://about.gitlab.com/releases/2021/06/01/security-release-gitlab-13-12-2-released/
|
8ba8278d-db06-11eb-ba49-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
DoS using Webhook connections
CSRF on GraphQL API allows executing mutations through GET requests
Private projects information disclosure
Denial of service of user profile page
Single sign-on users not getting blocked
Some users can push to Protected Branch with Deploy keys
A deactivated user can access data through GraphQL
Reflected XSS in release edit page
Clipboard DOM-based XSS
Stored XSS on Audit Log
Forks of public projects by project members could leak codebase
Improper text rendering
HTML Injection in full name field
Discovery 2021-07-01 Entry 2021-07-02 gitlab-ce
ge 14.0.0 lt 14.0.2
ge 13.12.0 lt 13.12.6
ge 8.0.0 lt 13.11.6
https://about.gitlab.com/releases/2021/07/01/security-release-gitlab-14-0-2-released/
|
a2a2b34d-52b4-11eb-87cb-001b217b3468 | Gitlab -- multiple vulnerabilities
Gitlab reports:
Ability to steal a user's API access token through GitLab Pages
Prometheus denial of service via HTTP request with custom method
Unauthorized user is able to access private repository information under specific conditions
Regular expression denial of service in NuGet API
Regular expression denial of service in package uploads
Update curl dependency
CVE-2019-3881 mitigation
Discovery 2021-01-07 Entry 2021-01-09 gitlab-ce
ge 13.7.0 lt 13.7.2
ge 13.6.0 lt 13.6.4
ge 12.2 lt 13.5.6
https://about.gitlab.com/releases/2021/01/07/security-release-gitlab-13-7-2-released/
CVE-2021-22166
CVE-2020-26414
CVE-2019-3881
|
3117e6cd-1772-11ee-9cd6-001b217b3468 | Gitlab -- Vulnerabilities
Gitlab reports:
ReDoS via EpicReferenceFilter in any Markdown fields
New commits to private projects visible in forks created while project was public
New commits to private projects visible in forks created while project was public
Maintainer can leak masked webhook secrets by manipulating URL masking
Information disclosure of project import errors
Sensitive information disclosure via value stream analytics controller
Bypassing Code Owners branch protection rule in GitLab
HTML injection in email address
Webhook token leaked in Sidekiq logs if log format is 'default'
Private email address of service desk issue creator disclosed via issues API
Discovery 2023-06-29 Entry 2023-06-30 gitlab-ce
ge 16.1.0 lt 16.1.1
ge 16.0.0 lt 16.0.6
ge 15.11.0 lt 15.11.10
ge 7.14.0 lt 15.10.8
CVE-2023-3424
CVE-2023-2190
CVE-2023-3444
CVE-2023-2620
CVE-2023-3362
CVE-2023-3102
CVE-2023-2576
CVE-2023-2200
CVE-2023-3363
CVE-2023-1936
https://about.gitlab.com/releases/2023/06/29/security-release-gitlab-16-1-1-released/
|
1ece5591-4ea9-11ea-86f0-001b217b3468 | Gitlab -- Vulnerability
Gitlab reports:
Incorrect membership handling of group sharing feature
Discovery 2020-02-13 Entry 2020-02-13 gitlab-ce
ge 12.7.0 lt 12.7.6
ge 12.6.0 lt 12.6.7
ge 12.5.0 lt 12.5.10
https://about.gitlab.com/releases/2020/02/13/critical-security-release-gitlab-12-dot-7-dot-6-released/
CVE-2020-8795
|
d2992bc2-ed18-11ee-96dc-001b217b3468 | Gitlab -- vulnerabilities
Gitlab reports:
Stored-XSS injected in Wiki page via Banzai pipeline
DOS using crafted emojis
Discovery 2024-03-27 Entry 2024-03-28 gitlab-ce
ge 16.10.0 lt 16.10.1
ge 16.9.0 lt 16.9.3
< 16.8.5
CVE-2023-6371
CVE-2024-2818
https://about.gitlab.com/releases/2024/03/27/security-release-gitlab-16-10-1-released/
|
ee890be3-a1ec-11ed-a81d-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Denial of Service via arbitrarily large Issue descriptions
CSRF via file upload allows an attacker to take over a repository
Sidekiq background job DoS by uploading malicious CI job artifact zips
Sidekiq background job DoS by uploading a malicious Helm package
Discovery 2023-01-31 Entry 2023-02-01 gitlab-ce
ge 15.8.0 lt 15.8.1
ge 15.7.0 lt 15.7.6
ge 12.4.0 lt 15.6.7
CVE-2022-3411
CVE-2022-4138
CVE-2022-3759
CVE-2023-0518
https://about.gitlab.com/releases/2023/01/31/security-release-gitlab-15-8-1-released/
|
cdb5338d-04ec-11ee-9c88-001b217b3468 | Gitlab -- Vulnerability
Gitlab reports:
Stored-XSS with CSP-bypass in Merge requests
ReDoS via FrontMatterFilter in any Markdown fields
ReDoS via InlineDiffFilter in any Markdown fields
ReDoS via DollarMathPostFilter in Markdown fields
DoS via malicious test report artifacts
Restricted IP addresses can clone repositories of public projects
Reflected XSS in Report Abuse Functionality
Privilege escalation from maintainer to owner by importing members from a project
Bypassing tags protection in GitLab
Denial of Service using multiple labels with arbitrarily large descriptions
Ability to use an unverified email for public and commit emails
Open Redirection Through HTTP Response Splitting
Disclosure of issue notes to an unauthorized user when exporting a project
Ambiguous branch name exploitation
Discovery 2023-06-05 Entry 2023-06-07 gitlab-ce
ge 16.0.0 lt 16.0.2
ge 15.11.0 lt 15.11.7
ge 15.10.0 lt 15.10.8
ge 1.2 lt 15.9.8
CVE-2023-2442
CVE-2023-2199
CVE-2023-2198
CVE-2023-2132
CVE-2023-0121
CVE-2023-2589
CVE-2023-2015
CVE-2023-2485
CVE-2023-2001
CVE-2023-0921
CVE-2023-1204
CVE-2023-0508
CVE-2023-1825
CVE-2023-2013
https://about.gitlab.com/releases/2023/06/05/security-release-gitlab-16-0-2-released/
|
3a023570-91ab-11ed-8950-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Race condition on gitlab.com enables verified email forgery and third-party account hijacking
DOS and high resource consumption of Prometheus server through abuse of Grafana integration proxy endpoint
Maintainer can leak sentry token by changing the configured URL
Maintainer can leak masked webhook secrets by changing target URL of the webhook
Cross-site scripting in wiki changes page affecting self-hosted instances running without strict CSP
Group access tokens continue to work after owner loses ability to revoke them
Users' avatar disclosure by user ID in private GitLab instances
Arbitrary Protocol Redirection in GitLab Pages
Regex DoS due to device-detector parsing user agents
Regex DoS in the Submodule Url Parser
Discovery 2023-01-09 Entry 2023-01-11 gitlab-ce
ge 15.7.0 lt 15.7.2
ge 15.6.0 lt 15.6.4
ge 6.6.0 lt 15.5.7
CVE-2022-4037
CVE-2022-3613
CVE-2022-4365
CVE-2022-4342
CVE-2022-3573
CVE-2022-4167
CVE-2022-3870
CVE-2023-0042
CVE-2022-4131
CVE-2022-3514
https://about.gitlab.com/releases/2023/01/09/security-release-gitlab-15-7-2-released/
|
3b14b2b4-9014-11ee-98b3-001b217b3468 | Gitlab -- Vulnerabilities
Gitlab reports:
XSS and ReDoS in Markdown via Banzai pipeline of Jira
Members with admin_group_member custom permission can add members with higher role
Release Description visible in public projects despite release set as project members only through atom response
Manipulate the repository content in the UI (CVE-2023-3401 bypass)
External user can abuse policy bot to gain access to internal projects
Client-side DOS via Mermaid Flowchart
Developers can update pipeline schedules to use protected branches even if they don't have permission to merge
Users can install Composer packages from public projects even when Package registry is turned off
Unauthorized member can gain Allowed to push and merge access and affect integrity of protected branches
Guest users can react (emojis) on confidential work items which they cant see in a project
Discovery 2023-11-30 Entry 2023-12-01 gitlab-ce
ge 16.6.0 lt 16.6.1
ge 16.5.0 lt 16.5.3
ge 8.13.0 lt 16.4.3
CVE-2023-6033
CVE-2023-6396
CVE-2023-3949
CVE-2023-5226
CVE-2023-5995
CVE-2023-4912
CVE-2023-4317
CVE-2023-3964
CVE-2023-4658
CVE-2023-3443
https://about.gitlab.com/releases/2023/11/30/security-release-gitlab-16-6-1-released/
|
c5bd9068-440f-11ea-9cdb-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Path Traversal to Arbitrary File Read
User Permissions Not Validated in ProjectExportWorker
XSS Vulnerability in File API
Package and File Disclosure through GitLab Workhorse
XSS Vulnerability in Create Groups
Issue and Merge Request Activity Counts Exposed
Email Confirmation Bypass Using AP
Disclosure of Forked Private Project Source Code
Private Project Names Exposed in GraphQL queries
Disclosure of Issues and Merge Requests via Todos
Denial of Service via AsciiDoc
Last Pipeline Status Exposed
Arbitrary Change of Pipeline Status
Grafana Token Displayed in Plaintext
Update excon gem
Update rdoc gem
Update rack-cors gem
Update rubyzip gem
Discovery 2020-01-30 Entry 2020-01-31 gitlab-ce
ge 12.7.0 lt 12.7.4
ge 12.6.0 lt 12.6.6
ge 5.3 lt 12.5.9
CVE-2020-7971
CVE-2020-7967
https://about.gitlab.com/releases/2020/01/30/security-release-gitlab-12-7-4-released/
CVE-2020-7966
CVE-2020-8114
CVE-2020-7973
CVE-2020-6833
CVE-2020-7972
CVE-2020-7968
CVE-2020-7979
CVE-2020-7969
CVE-2020-7978
CVE-2020-7974
CVE-2020-7977
CVE-2020-7976
CVE-2019-16779
CVE-2019-18978
CVE-2019-16892
|
f414d69f-e43d-11ec-9ea4-001b217b3468 | Gitlab -- multiple vulnerabilities
Gitlab reports:
Account take over via SCIM email change
Stored XSS in Jira integration
Quick action commands susceptible to XSS
IP allowlist bypass when using Trigger tokens
IP allowlist bypass when using Project Deploy Tokens
Improper authorization in the Interactive Web Terminal
Subgroup member can list members of parent group
Group member lock bypass
Discovery 2022-06-01 Entry 2022-06-04 gitlab-ce
ge 15.0.0 lt 15.0.1
ge 14.10.0 lt 14.10.4
ge 11.10.0 lt 14.9.5
CVE-2022-1680
CVE-2022-1940
CVE-2022-1948
CVE-2022-1935
CVE-2022-1936
CVE-2022-1944
CVE-2022-1821
CVE-2022-1783
https://about.gitlab.com/releases/2022/06/01/critical-security-release-gitlab-15-0-1-released/
|
43f84437-73ab-11ec-a587-001b217b3468 | Gitlab -- Multiple Vulnerabilities
Gitlab reports:
Arbitrary file read via group import feature
Stored XSS in notes
Lack of state parameter on GitHub import project OAuth
Vulnerability related fields are available to unauthorized users on GraphQL API
Deleting packages may cause table locks
IP restriction bypass via GraphQL
Repository content spoofing using Git replacement references
Users can import members from projects that they are not a maintainer on through API
Possibility to direct user to malicious site through Slack integration
Bypassing file size limits to the NPM package repository
User with expired password can still access sensitive information
Incorrect port validation allows access to services on ports 80 and 443 if GitLab is configured to run on another port
Discovery 2022-01-11 Entry 2022-01-12 gitlab-ce
ge 14.6.0 lt 14.6.2
ge 14.5.0 lt 14.5.3
ge 7.7 lt 14.4.5
CVE-2021-39946
CVE-2022-0154
CVE-2022-0152
CVE-2022-0151
CVE-2022-0172
CVE-2022-0090
CVE-2022-0125
CVE-2022-0124
CVE-2021-39942
CVE-2022-0093
CVE-2021-39927
https://about.gitlab.com/releases/2022/01/11/security-release-gitlab-14-6-2-released/
|