Summary
Detail | |||
---|---|---|---|
Vendor | Gitlab | First view | 2017-08-02 |
Product | Gitlab | Last view | 2025-07-24 |
Version | 8.15.4 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | enterprise | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:gitlab:gitlab |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
2.7 | 2025-07-24 | CVE-2025-7001 | An issue has been discovered in GitLab CE/EE affecting all versions from 15.0 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1 that could have allowed priviledged users to access certain resource_group information through the API which should have been unavailable. |
5.3 | 2025-07-24 | CVE-2025-4976 | An issue has been discovered in GitLab EE affecting all versions from 17.0 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1 that, under certain circumstances, could have allowed an attacker to access internal notes in GitLab Duo responses. |
4.3 | 2025-07-24 | CVE-2025-1299 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 18.0.5, all versions starting from 18.1 before 18.1.3, all versions starting from 18.2 before 18.2.1 that, under circumstances, could have allowed an unauthorized user to read deployment job logs by sending a crafted request. |
8 | 2025-07-10 | CVE-2025-6948 | An issue has been discovered in GitLab CE/EE affecting all versions from 17.11 before 17.11.6, 18.0 before 18.0.4, and 18.1 before 18.1.2 that, under certain conditions, could have allowed a successful attacker to execute actions on behalf of users by injecting malicious content. |
2.7 | 2025-07-10 | CVE-2025-6168 | An issue has been discovered in GitLab EE affecting all versions from 18.0 before 18.0.4 and 18.1 before 18.1.2 that could have allowed authenticated maintainers to bypass group-level user invitation restrictions by sending crafted API requests. |
0 | 2025-07-10 | CVE-2025-4972 | An issue has been discovered in GitLab EE affecting all versions from 18.0 before 18.0.4 and 18.1 before 18.1.2 that could have allowed authenticated users with invitation privileges to bypass group-level user invitation restrictions by manipulating group invitation functionality. |
4.3 | 2025-07-10 | CVE-2025-3396 | An issue has been discovered in GitLab EE affecting all versions from 13.3 before 17.11.6, 18.0 before 18.0.4, and 18.1 before 18.1.2 that could have allowed authenticated project owners to bypass group-level forking restrictions by manipulating API requests. |
6.5 | 2025-05-22 | CVE-2025-3111 | An issue has been discovered in GitLab CE/EE affecting all versions from 10.2 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. A lack of input validation in the Kubernetes integration could allow an authenticated user to cause denial of service.. |
6.5 | 2025-05-22 | CVE-2025-2853 | An issue has been discovered in GitLab CE/EE affecting all versions before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. A lack of proper validation in GitLab could allow an authenticated user to cause a denial of service condition. |
6.5 | 2025-05-22 | CVE-2025-0993 | An issue has been discovered in GitLab CE/EE affecting all versions before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. This could allow an authenticated attacker to cause a denial of service condition by exhausting server resources. |
4.3 | 2025-05-22 | CVE-2025-0679 | An issue has been discovered in GitLab CE/EE affecting all versions from 17.1 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. Under certain conditions un-authorised users can view full email addresses that should be partially obscured. |
4.3 | 2025-05-22 | CVE-2025-0605 | An issue has been discovered in GitLab CE/EE affecting all versions from 16.8 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. Group access controls could allow certain users to bypass two-factor authentication requirements. |
6.1 | 2025-03-03 | CVE-2025-0555 | A Cross Site Scripting (XSS) vulnerability in GitLab-EE affecting all versions from 16.6 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1 allows an attacker to bypass security controls and execute arbitrary scripts in a users browser under specific conditions. |
6.1 | 2025-03-03 | CVE-2025-0475 | An issue has been discovered in GitLab CE/EE affecting all versions from 15.10 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1. A proxy feature could potentially allow unintended content rendering leading to XSS under specific circumstances. |
5.4 | 2025-03-03 | CVE-2024-8186 | An issue has been discovered in GitLab CE/EE affecting all versions from 16.6 before 17.7.6, 17.8 before 17.8.4, and 17.9 before 17.9.1. An attacker could inject HMTL into the child item search potentially leading to XSS in certain situations. |
0 | 2025-03-03 | CVE-2024-10925 | A vulnerability in GitLab-EE affecting all versions from 16.2 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1 allows a Guest user to read Security policy YAML |
7.5 | 2025-02-05 | CVE-2023-6386 | A denial of service vulnerability was identified in GitLab CE/EE, affecting all versions from 15.11 prior to 16.6.7, 16.7 prior to 16.7.5 and 16.8 prior to 16.8.2 which allows an attacker to spike the GitLab instance resource usage resulting in service degradation. |
8.8 | 2025-01-31 | CVE-2024-1211 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.6 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2 in which cross-site request forgery may have been possible on GitLab instances configured to use JWT as an OmniAuth provider. |
4.3 | 2025-01-31 | CVE-2023-6195 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. GitLab was vulnerable to Server Side Request Forgery when an attacker uses a malicious URL in the markdown image value when importing a GitHub repository. |
0 | 2025-01-28 | CVE-2025-0290 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.0 prior to 17.5.5, from 17.6 prior to 17.6.3, and from 17.7 prior to 17.7.1. Under certain conditions, processing of CI artifacts metadata could cause background jobs to become unresponsive. |
6.1 | 2025-01-24 | CVE-2025-0314 | An issue has been discovered in GitLab CE/EE affecting all versions from 17.2 before 17.6.4, 17.7 before 17.7.3, and 17.8 before 17.8.1. Improper rendering of certain file types lead to cross-site scripting. |
5.3 | 2025-01-24 | CVE-2024-11931 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 17.0 prior to 17.6.4, from 17.7 prior to 17.7.3, and from 17.8 prior to 17.8.1. Under certain conditions, it may have been possible for users with developer role to exfiltrate protected CI variables via CI lint. |
4.3 | 2025-01-09 | CVE-2024-6324 | An issue was discovered in GitLab CE/EE affecting all versions starting from 15.7 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. It was possible to trigger a DoS by creating cyclic references between epics. |
5.4 | 2025-01-09 | CVE-2024-13041 | An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. When a user is created via the SAML provider, the external groups setting overrides the external provider configuration. As a result, the user may not be marked as external thereby giving those users access to internal projects or groups. |
0 | 2025-01-08 | CVE-2025-0194 | An issue was discovered in GitLab CE/EE affecting all versions starting from 17.4 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. Under certain conditions, access tokens may have been logged when API requests were made in a specific manner. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
24% (134) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
8% (45) | CWE-200 | Information Exposure |
6% (35) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
5% (28) | CWE-639 | Access Control Bypass Through User-Controlled Key |
4% (27) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
4% (26) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
4% (25) | CWE-770 | Allocation of Resources Without Limits or Throttling |
2% (16) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
2% (16) | CWE-20 | Improper Input Validation |
2% (15) | CWE-287 | Improper Authentication |
2% (14) | CWE-532 | Information Leak Through Log Files |
2% (14) | CWE-269 | Improper Privilege Management |
2% (13) | CWE-352 | Cross-Site Request Forgery (CSRF) |
1% (10) | CWE-276 | Incorrect Default Permissions |
1% (9) | CWE-209 | Information Exposure Through an Error Message |
1% (8) | CWE-281 | Improper Preservation of Permissions |
1% (7) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
1% (6) | CWE-613 | Insufficient Session Expiration |
1% (6) | CWE-306 | Missing Authentication for Critical Function |
1% (6) | CWE-116 | Improper Encoding or Escaping of Output |
1% (6) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |
0% (5) | CWE-668 | Exposure of Resource to Wrong Sphere |
0% (5) | CWE-312 | Cleartext Storage of Sensitive Information |
0% (4) | CWE-640 | Weak Password Recovery Mechanism for Forgotten Password |
0% (4) | CWE-522 | Insufficiently Protected Credentials |
SAINT Exploits
Description | Link |
---|---|
GitLab ExifTool uploaded image command injection | More info here |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-17 | Gitlab directory traversal attempt RuleID : 51058 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51057 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51056 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51055 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51054 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51053 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51052 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51051 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51050 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51049 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51048 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51047 - Type : FILE-OTHER - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-17 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_ff50192c19eb11e98573001b217b3468.nasl - Type: ACT_GATHER_INFO |
2019-01-07 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b2f4ab910e6b11e98700001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-12-24 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_70b774a805bc11e987ad001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-12-17 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_757e6ee8ff9111e8a148001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-12-07 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_9d3428d4f98c11e8a148001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-11-29 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_8a4aba2df33e11e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-11-21 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_d889d32cecd911e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-11-02 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b51d9e83de0811e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-10-30 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b9591212dba711e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-10-09 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_23413442c8ea11e8b35c001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-10-02 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_065b3b72c5ab11e89ae2001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-07-27 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_2da838f9916811e88c75d8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-07-20 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_8fc615cc8a6611e88c75d8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-06-27 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b950a83b789e11e88545d8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-05-23 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4206.nasl - Type: ACT_GATHER_INFO |
2018-05-03 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_9dfe61c84d1511e88f2fd8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-03-29 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_dc0c201c31da11e8ac53d8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-03-19 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4145.nasl - Type: ACT_GATHER_INFO |
2018-01-18 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_65fab89f223146db8541978f4e87f32a.nasl - Type: ACT_GATHER_INFO |
2017-08-14 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_abcc5ad37e6a11e793f7d43d7e971a1b.nasl - Type: ACT_GATHER_INFO |