Summary
Detail | |||
---|---|---|---|
Vendor | Gitlab | First view | 2019-03-26 |
Product | Gitlab | Last view | 2024-10-10 |
Version | 11.5.0 | Type | Application |
Update | rc5 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | enterprise | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:gitlab:gitlab |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.5 | 2024-10-10 | CVE-2024-9623 | An issue was discovered in GitLab CE/EE affecting all versions starting from 8.16 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows deploy keys to push to an archived repository. |
5.3 | 2024-10-10 | CVE-2024-9596 | An issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. It was possible for an unauthenticated attacker to determine the GitLab version number for a GitLab instance. |
8.1 | 2024-10-10 | CVE-2024-8977 | An issue has been discovered in GitLab EE affecting all versions starting from 15.10 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. Instances with Product Analytics Dashboard configured and enabled could be vulnerable to SSRF attacks. |
5.4 | 2024-10-10 | CVE-2024-6530 | A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 17.1 prior 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2. When adding a authorizing an application, it can be made to render as HTML under specific circumstances. |
4.3 | 2024-09-26 | CVE-2024-8974 | Information disclosure in Gitlab EE/CE affecting all versions from 15.6 prior to 17.2.8, 17.3 prior to 17.3.4, and 17.4 prior to 17.4.1 in specific conditions it was possible to disclose to an unauthorised user the path of a private project." |
2.7 | 2024-09-26 | CVE-2024-4278 | An information disclosure issue has been discovered in GitLab EE affecting all versions starting from 16.5 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. A maintainer could obtain a Dependency Proxy password by editing a certain Dependency Proxy setting. |
5.3 | 2024-09-26 | CVE-2024-4099 | An issue has been discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. An AI feature was found to read unsanitized content in a way that could have allowed an attacker to hide prompt injection. |
4.3 | 2024-09-16 | CVE-2024-6685 | An issue was discovered in GitLab CE/EE affecting all versions starting from 16.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2, where group runners information was disclosed to unauthorised group members. |
6.1 | 2024-09-16 | CVE-2024-4283 | An issue has been discovered in GitLab EE affecting all versions starting from 11.1 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow. |
8.1 | 2024-09-12 | CVE-2024-8754 | An issue has been discovered in GitLab EE/CE affecting all versions from 16.9.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2. An improper input validation error allows attacker to squat on accounts via linking arbitrary unclaimed provider identities when JWT authentication is configured. |
8.8 | 2024-09-12 | CVE-2024-8641 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It may have been possible for an attacker with a victim's CI_JOB_TOKEN to obtain a GitLab session token belonging to the victim. |
8.8 | 2024-09-12 | CVE-2024-8640 | An issue has been discovered in GitLab EE affecting all versions starting from 16.11 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. Due to incomplete input filtering, it was possible to inject commands into a connected Cube server. |
6.5 | 2024-09-12 | CVE-2024-8635 | A server-side request forgery issue has been discovered in GitLab EE affecting all versions starting from 16.8 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It was possible for an attacker to make requests to internal resources using a custom Maven Dependency Proxy URL |
7.2 | 2024-09-12 | CVE-2024-8631 | A privilege escalation issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. A user assigned the Admin Group Member custom role could have escalated their privileges to include other custom roles. |
6.5 | 2024-09-12 | CVE-2024-8311 | An issue was discovered with pipeline execution policies in GitLab EE affecting all versions from 17.2 prior to 17.2.5, 17.3 prior to 17.3.2 which allows authenticated users to bypass variable overwrite protection via inclusion of a CI/CD template. |
7.5 | 2024-09-12 | CVE-2024-8124 | An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.1.7, starting from 17.2 prior to 17.2.5, starting from 17.3 prior to 17.3.2 which could cause Denial of Service via sending a specific POST request. |
8.8 | 2024-09-12 | CVE-2024-6678 | An issue was discovered in GitLab CE/EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, which allows an attacker to trigger a pipeline as an arbitrary user under certain circumstances. |
3.5 | 2024-09-12 | CVE-2024-6446 | An issue has been discovered in GitLab affecting all versions starting from 17.1 to 17.1.7, 17.2 prior to 17.2.5 and 17.3 prior to 17.3.2. A crafted URL could be used to trick a victim to trust an attacker controlled application. |
4.3 | 2024-09-12 | CVE-2024-6389 | An issue was discovered in GitLab-CE/EE affecting all versions starting with 17.0 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. An attacker as a guest user was able to access commit information via the release Atom endpoint, contrary to permissions. |
6.5 | 2024-09-12 | CVE-2024-5435 | An issue has been discovered discovered in GitLab EE/CE affecting all versions starting from 15.10 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2 will disclose user password from repository mirror configuration. |
7.5 | 2024-09-12 | CVE-2024-4660 | An issue has been discovered in GitLab EE affecting all versions starting from 11.2 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2. It was possible for a guest to read the source code of a private project by using group templates. |
6.1 | 2024-09-12 | CVE-2024-4612 | An issue has been discovered in GitLab EE affecting all versions starting from 12.9 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow. |
5.5 | 2024-09-12 | CVE-2024-4472 | An issue was discovered in GitLab CE/EE affecting all versions starting from 16.5 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, where dependency proxy credentials are retained in graphql Logs. |
9.1 | 2024-09-12 | CVE-2024-2743 | An issue was discovered in GitLab-EE starting with version 13.3 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2 that would allow an attacker to modify an on-demand DAST scan without permissions and leak variables. |
9.8 | 2024-09-10 | CVE-2024-45409 | The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
22% (105) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
7% (36) | CWE-200 | Information Exposure |
7% (35) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
5% (26) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
5% (24) | CWE-639 | Access Control Bypass Through User-Controlled Key |
4% (20) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
3% (15) | CWE-770 | Allocation of Resources Without Limits or Throttling |
2% (14) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
2% (14) | CWE-269 | Improper Privilege Management |
2% (13) | CWE-287 | Improper Authentication |
2% (12) | CWE-532 | Information Leak Through Log Files |
2% (11) | CWE-20 | Improper Input Validation |
2% (10) | CWE-276 | Incorrect Default Permissions |
1% (9) | CWE-209 | Information Exposure Through an Error Message |
1% (8) | CWE-352 | Cross-Site Request Forgery (CSRF) |
1% (8) | CWE-281 | Improper Preservation of Permissions |
1% (7) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
1% (6) | CWE-613 | Insufficient Session Expiration |
1% (6) | CWE-116 | Improper Encoding or Escaping of Output |
1% (6) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |
1% (5) | CWE-668 | Exposure of Resource to Wrong Sphere |
1% (5) | CWE-306 | Missing Authentication for Critical Function |
0% (4) | CWE-522 | Insufficiently Protected Credentials |
0% (4) | CWE-312 | Cleartext Storage of Sensitive Information |
0% (4) | CWE-295 | Certificate Issues |
SAINT Exploits
Description | Link |
---|---|
GitLab ExifTool uploaded image command injection | More info here |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-07 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b2f4ab910e6b11e98700001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-12-24 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_70b774a805bc11e987ad001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-12-17 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_757e6ee8ff9111e8a148001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-12-07 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_9d3428d4f98c11e8a148001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-11-29 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_8a4aba2df33e11e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-11-21 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_d889d32cecd911e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-10-30 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b9591212dba711e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |