Summary
Detail | |||
---|---|---|---|
Vendor | Gitlab | First view | 2014-05-12 |
Product | Gitlab | Last view | 2024-08-22 |
Version | 2.8.1 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:gitlab:gitlab |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.5 | 2024-08-22 | CVE-2024-8041 | A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all versions prior to 17.1.6, 17.2 prior to 17.2.4, and 17.3 prior to 17.3.1. A denial of service could occur upon importing a maliciously crafted repository using the GitHub importer. |
6.4 | 2024-08-22 | CVE-2024-7110 | An issue was discovered in GitLab EE affecting all versions starting 17.0 to 17.1.6, 17.2 prior to 17.2.4, and 17.3 prior to 17.3.1 allows an attacker to execute arbitrary command in a victim's pipeline through prompt injection. |
6.5 | 2024-08-22 | CVE-2024-6502 | An issue was discovered in GitLab CE/EE affecting all versions starting from 8.2 prior to 17.1.6 starting from 17.2 prior to 17.2.4, and starting from 17.3 prior to 17.3.1, which allows an attacker to create a branch with the same name as a deleted tag. |
6.5 | 2024-08-08 | CVE-2024-7610 | A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions starting with 15.9 before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. It is possible for an attacker to cause catastrophic backtracking while parsing results from Elasticsearch. |
6.5 | 2024-08-08 | CVE-2024-7554 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.9 before 17.0.6, all versions starting from 17.1 before 17.1.4, all versions starting from 17.2 before 17.2.2. Under certain conditions, access tokens may have been logged when an API request was made in a specific manner. |
7.5 | 2024-08-08 | CVE-2024-6329 | An issue was discovered in GitLab CE/EE affecting all versions starting from 8.16 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2, which causes the web interface to fail to render the diff correctly when the path is encoded. |
6.5 | 2024-08-08 | CVE-2024-5423 | Multiple Denial of Service (DoS) conditions has been discovered in GitLab CE/EE affecting all versions starting from 1.0 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2 which allowed an attacker to cause resource exhaustion via banzai pipeline. |
5.4 | 2024-08-08 | CVE-2024-4784 | An issue was discovered in GitLab EE starting from version 16.7 before 17.0.6, version 17.1 before 17.1.4 and 17.2 before 17.2.2 that allowed bypassing the password re-entry requirement to approve a policy. |
6.5 | 2024-08-08 | CVE-2024-4210 | A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions starting with 12.6 before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. It is possible for an attacker to cause a denial of service using crafted adoc files. |
5.4 | 2024-08-08 | CVE-2024-4207 | A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 prior 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2. When viewing an XML file in a repository in raw mode, it can be made to render as HTML if viewed under specific circumstances. |
6.5 | 2024-08-08 | CVE-2024-3958 | An issue has been discovered in GitLab CE/EE affecting all versions before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. An issue was found that allows someone to abuse a discrepancy between the Web application display and the git command line interface to social engineer victims into cloning non-trusted code. |
6.5 | 2024-08-08 | CVE-2024-3114 | An issue was discovered in GitLab CE/EE affecting all versions starting from 11.10 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2, with the processing logic for parsing invalid commits can lead to a regular expression DoS attack on the server. |
8.1 | 2024-08-08 | CVE-2024-3035 | A permission check vulnerability in GitLab CE/EE affecting all versions starting from 8.12 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2 allowed for LFS tokens to read and write to the user owned repositories. |
7.5 | 2024-08-08 | CVE-2024-2800 | ReDoS flaw in RefMatcher when matching branch names using wildcards in GitLab EE/CE affecting all versions from 11.3 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2 allows denial of service via Regex backtracking. |
4.3 | 2024-07-25 | CVE-2024-7057 | An information disclosure vulnerability in GitLab CE/EE affecting all versions starting from 16.7 prior to 17.0.5, starting from 17.1 prior to 17.1.3, and starting from 17.2 prior to 17.2.1 where job artifacts can be inappropriately exposed to users lacking the proper authorization level. |
5.4 | 2024-07-25 | CVE-2024-7047 | A cross site scripting vulnerability exists in GitLab CE/EE affecting all versions from 16.6 prior to 17.0.5, 17.1 prior to 17.1.3, 17.2 prior to 17.2.1 allowing an attacker to execute arbitrary scripts under the context of the current logged in user. |
5 | 2024-07-24 | CVE-2024-7091 | An issue was discovered in GitLab CE/EE affecting all versions starting from 15.6 prior to 17.0.5, starting from 17.1 prior to 17.1.3, and starting from 17.2 prior to 17.2.1 where it was possible to disclose limited information of an exported group or project to another user. |
6.5 | 2024-07-24 | CVE-2024-7060 | An information disclosure vulnerability in GitLab CE/EE in project/group exports affecting all versions from 15.4 prior to 17.0.5, 17.1 prior to 17.1.3, and 17.2 prior to 17.2.1 allows unauthorized users to view the resultant export. |
4.9 | 2024-07-24 | CVE-2024-5067 | An issue was discovered in GitLab EE affecting all versions starting from 16.11 prior to 17.0.5, starting from 17.1 prior to 17.1.3, and starting from 17.2 prior to 17.2.1 where certain project-level analytics settings could be leaked in DOM to group members with Developer or higher roles. |
2.7 | 2024-07-24 | CVE-2024-0231 | A resource misdirection vulnerability in GitLab CE/EE versions 12.0 prior to 17.0.5, 17.1 prior to 17.1.3, and 17.2 prior to 17.2.1 allows an attacker to craft a repository import in such a way as to misdirect commits. |
5.3 | 2024-07-17 | CVE-2024-6595 | An issue was discovered in GitLab CE/EE affecting all versions starting from 11.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2 where it was possible to upload an NPM package with conflicting package data. |
9.8 | 2024-07-11 | CVE-2024-6385 | An issue was discovered in GitLab CE/EE affecting all versions starting from 15.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2, which allows an attacker to trigger a pipeline as another user under certain circumstances. |
2.7 | 2024-07-11 | CVE-2024-5470 | An issue was discovered in GitLab CE/EE affecting all versions starting from 17.0 prior to 17.0.4 and from 17.1 prior to 17.1.2 where a Guest user with `admin_push_rules` permission may have been able to create project-level deploy tokens. |
2.7 | 2024-07-11 | CVE-2024-5257 | An issue was discovered in GitLab CE/EE affecting all versions starting from 17.0 prior to 17.0.4 and from 17.1 prior to 17.1.2 where a Developer user with `admin_compliance_framework` custom role may have been able to modify the URL for a group namespace. |
2.7 | 2024-07-11 | CVE-2024-2880 | An issue was discovered in GitLab CE/EE affecting all versions starting from 16.5 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2 in which a user with `admin_group_member` custom role permission could ban group members. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
23% (121) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
8% (45) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
8% (45) | CWE-200 | Information Exposure |
5% (26) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
5% (26) | CWE-639 | Access Control Bypass Through User-Controlled Key |
4% (24) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
3% (17) | CWE-269 | Improper Privilege Management |
3% (16) | CWE-20 | Improper Input Validation |
2% (15) | CWE-287 | Improper Authentication |
2% (12) | CWE-532 | Information Leak Through Log Files |
2% (11) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
1% (10) | CWE-770 | Allocation of Resources Without Limits or Throttling |
1% (10) | CWE-352 | Cross-Site Request Forgery (CSRF) |
1% (10) | CWE-276 | Incorrect Default Permissions |
1% (8) | CWE-668 | Exposure of Resource to Wrong Sphere |
1% (8) | CWE-281 | Improper Preservation of Permissions |
1% (8) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
1% (7) | CWE-209 | Information Exposure Through an Error Message |
1% (6) | CWE-613 | Insufficient Session Expiration |
1% (6) | CWE-306 | Missing Authentication for Critical Function |
1% (6) | CWE-74 | Failure to Sanitize Data into a Different Plane ('Injection') |
0% (5) | CWE-312 | Cleartext Storage of Sensitive Information |
0% (5) | CWE-116 | Improper Encoding or Escaping of Output |
0% (5) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |
0% (4) | CWE-640 | Weak Password Recovery Mechanism for Forgotten Password |
SAINT Exploits
Description | Link |
---|---|
GitLab ExifTool uploaded image command injection | More info here |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-17 | Gitlab directory traversal attempt RuleID : 51058 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51057 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51056 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51055 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51054 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51053 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51052 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51051 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51050 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51049 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51048 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51047 - Type : FILE-OTHER - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-17 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_ff50192c19eb11e98573001b217b3468.nasl - Type: ACT_GATHER_INFO |
2019-01-07 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b2f4ab910e6b11e98700001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-12-24 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_70b774a805bc11e987ad001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-12-17 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_757e6ee8ff9111e8a148001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-12-07 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_9d3428d4f98c11e8a148001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-11-29 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_8a4aba2df33e11e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-11-21 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_d889d32cecd911e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-11-02 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b51d9e83de0811e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-10-30 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b9591212dba711e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-10-09 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_23413442c8ea11e8b35c001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-10-02 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_065b3b72c5ab11e89ae2001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-07-27 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_2da838f9916811e88c75d8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-07-20 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_8fc615cc8a6611e88c75d8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-06-27 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b950a83b789e11e88545d8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-05-23 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4206.nasl - Type: ACT_GATHER_INFO |
2018-05-03 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_9dfe61c84d1511e88f2fd8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-03-29 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_dc0c201c31da11e8ac53d8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-03-19 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4145.nasl - Type: ACT_GATHER_INFO |
2018-01-18 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_65fab89f223146db8541978f4e87f32a.nasl - Type: ACT_GATHER_INFO |
2017-08-14 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_abcc5ad37e6a11e793f7d43d7e971a1b.nasl - Type: ACT_GATHER_INFO |