Summary
Detail | |||
---|---|---|---|
Vendor | Gitlab | First view | 2014-05-12 |
Product | Gitlab | Last view | 2023-01-17 |
Version | 5.4.1 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | enterprise | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:gitlab:gitlab |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.5 | 2023-01-17 | CVE-2022-2907 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.9 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. It was possible to read repository content by an unauthorised user if a project member used a crafted link. |
6.1 | 2023-01-12 | CVE-2023-0042 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.4 prior to 15.5.7, 15.6 prior to 15.6.4, and 15.7 prior to 15.7.2. GitLab Pages allows redirection to arbitrary protocols. |
4.3 | 2023-01-12 | CVE-2022-4365 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A malicious Maintainer can leak the sentry token by changing the configured URL in the Sentry error tracking settings page. |
3.8 | 2023-01-12 | CVE-2022-4342 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.1 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A malicious Maintainer can leak masked webhook secrets by changing target URL of the webhook. |
7.5 | 2023-01-12 | CVE-2022-4167 | Incorrect Authorization check affecting all versions of GitLab EE from 13.11 prior to 15.5.7, 15.6 prior to 15.6.4, and 15.7 prior to 15.7.2 allows group access tokens to continue working even after the group owner loses the ability to revoke them. |
5.3 | 2023-01-12 | CVE-2022-4131 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.8 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. An attacker may cause Denial of Service on a GitLab instance by exploiting a regex issue in how the application parses user agents. |
8.5 | 2023-01-12 | CVE-2022-4037 | An issue has been discovered in GitLab CE/EE affecting all versions before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A race condition can lead to verified email forgery and takeover of third-party accounts when using GitLab as an OAuth provider. |
5.3 | 2023-01-12 | CVE-2022-3870 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.0 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. GitLab allows unauthenticated users to download user avatars using the victim's user ID, on private instances that restrict public level visibility. |
7.5 | 2023-01-12 | CVE-2022-3613 | An issue has been discovered in GitLab CE/EE affecting all versions before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A crafted Prometheus Server query can cause high resource consumption and may lead to Denial of Service. |
5.4 | 2023-01-12 | CVE-2022-3573 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. Due to the improper filtering of query parameters in the wiki changes page, an attacker can execute arbitrary JavaScript on the self-hosted instances running without strict CSP. |
5.3 | 2023-01-12 | CVE-2022-3514 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 6.6 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. An attacker may cause Denial of Service on a GitLab instance by exploiting a regex issue in the submodule URL parser. |
4.3 | 2022-11-10 | CVE-2022-3819 | An improper authorization issue in GitLab CE/EE affecting all versions from 15.0 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a malicious users to set emojis on internal notes they don't have access to. |
5.3 | 2022-11-10 | CVE-2022-3818 | An uncontrolled resource consumption issue when parsing URLs in GitLab CE/EE affecting all versions prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to cause performance issues and potentially a denial of service on the GitLab instance. |
5.3 | 2022-11-10 | CVE-2022-3793 | An improper authorization issue in GitLab CE/EE affecting all versions from 14.4 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to read variables set directly in a GitLab CI/CD configuration file they don't have access to. |
9 | 2022-11-10 | CVE-2022-3726 | Lack of sand-boxing of OpenAPI documents in GitLab CE/EE affecting all versions from 12.6 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to trick a user to click on the Swagger OpenAPI viewer and issue HTTP requests that affect the victim's account. |
4.3 | 2022-11-10 | CVE-2022-3706 | Improper authorization in GitLab CE/EE affecting all versions from 7.14 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a user retrying a job in a downstream pipeline to take ownership of the retried jobs in the upstream pipeline even if the user doesn't have access to that project. |
4.3 | 2022-11-10 | CVE-2022-3413 | Incorrect authorization during display of Audit Events in GitLab EE affecting all versions from 14.5 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2, allowed Developers to view the project's Audit Events and Developers or Maintainers to view the group's Audit Events. These should have been restricted to Project Maintainers, Group Owners, and above. |
6.1 | 2022-11-09 | CVE-2022-3486 | An open redirect vulnerability in GitLab EE/CE affecting all versions from 9.3 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2, allows an attacker to redirect users to an arbitrary location if they trust the URL. |
5.4 | 2022-11-09 | CVE-2022-3483 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.1 before 15.3.5, all versions starting from 15.4 before 15.4.4, all versions starting from 15.5 before 15.5.2. A malicious maintainer could exfiltrate a Datadog integration's access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server. |
7.5 | 2022-11-09 | CVE-2022-3285 | Bypass of healthcheck endpoint allow list affecting all versions from 12.0 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows an unauthorized attacker to prevent access to GitLab |
6.1 | 2022-11-09 | CVE-2022-3280 | An open redirect in GitLab CE/EE affecting all versions from 10.1 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to trick users into visiting a trustworthy URL and being redirected to arbitrary content. |
5.4 | 2022-11-09 | CVE-2022-3265 | A cross-site scripting issue has been discovered in GitLab CE/EE affecting all versions prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. It was possible to exploit a vulnerability in setting the labels colour feature which could lead to a stored XSS that allowed attackers to perform arbitrary actions on behalf of victims at client side. |
5.3 | 2022-11-09 | CVE-2022-2761 | An information disclosure issue in GitLab CE/EE affecting all versions from 14.4 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to use GitLab Flavored Markdown (GFM) references in a Jira issue to disclose the names of resources they don't have access to. |
5.4 | 2022-11-02 | CVE-2022-2904 | A cross-site scripting issue has been discovered in GitLab CE/EE affecting all versions starting from 15.2 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1 It was possible to exploit a vulnerability in the external status checks feature which could lead to a stored XSS that allowed attackers to perform arbitrary actions on behalf of victims at client side. |
4.9 | 2022-10-28 | CVE-2022-3018 | An information disclosure vulnerability in GitLab CE/EE affecting all versions starting from 9.3 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1 allows a project maintainer to access the DataDog integration API key from webhook logs. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
22% (99) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
10% (46) | CWE-200 | Information Exposure |
8% (39) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
5% (26) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
4% (21) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
4% (20) | CWE-639 | Access Control Bypass Through User-Controlled Key |
4% (18) | CWE-20 | Improper Input Validation |
3% (16) | CWE-269 | Improper Privilege Management |
3% (14) | CWE-287 | Improper Authentication |
2% (11) | CWE-770 | Allocation of Resources Without Limits or Throttling |
2% (10) | CWE-532 | Information Leak Through Log Files |
2% (9) | CWE-276 | Incorrect Default Permissions |
1% (8) | CWE-668 | Exposure of Resource to Wrong Sphere |
1% (8) | CWE-281 | Improper Preservation of Permissions |
1% (7) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
1% (7) | CWE-352 | Cross-Site Request Forgery (CSRF) |
1% (7) | CWE-209 | Information Exposure Through an Error Message |
1% (6) | CWE-613 | Insufficient Session Expiration |
1% (6) | CWE-306 | Missing Authentication for Critical Function |
0% (4) | CWE-312 | Cleartext Storage of Sensitive Information |
0% (4) | CWE-284 | Access Control (Authorization) Issues |
0% (3) | CWE-640 | Weak Password Recovery Mechanism for Forgotten Password |
0% (3) | CWE-522 | Insufficiently Protected Credentials |
0% (3) | CWE-362 | Race Condition |
0% (3) | CWE-295 | Certificate Issues |
SAINT Exploits
Description | Link |
---|---|
GitLab ExifTool uploaded image command injection | More info here |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-17 | Gitlab directory traversal attempt RuleID : 51058 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51057 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51056 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51055 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51054 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51053 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51052 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51051 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51050 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51049 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51048 - Type : FILE-OTHER - Revision : 1 |
2019-09-17 | Gitlab directory traversal attempt RuleID : 51047 - Type : FILE-OTHER - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-17 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_ff50192c19eb11e98573001b217b3468.nasl - Type: ACT_GATHER_INFO |
2019-01-07 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b2f4ab910e6b11e98700001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-12-24 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_70b774a805bc11e987ad001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-12-17 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_757e6ee8ff9111e8a148001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-12-07 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_9d3428d4f98c11e8a148001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-11-29 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_8a4aba2df33e11e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-11-21 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_d889d32cecd911e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-11-02 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b51d9e83de0811e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-10-30 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b9591212dba711e89416001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-10-09 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_23413442c8ea11e8b35c001b217b3468.nasl - Type: ACT_GATHER_INFO |
2018-07-27 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_2da838f9916811e88c75d8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-07-20 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_8fc615cc8a6611e88c75d8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-06-27 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b950a83b789e11e88545d8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-05-23 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4206.nasl - Type: ACT_GATHER_INFO |
2018-05-03 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_9dfe61c84d1511e88f2fd8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-03-29 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_dc0c201c31da11e8ac53d8cb8abf62dd.nasl - Type: ACT_GATHER_INFO |
2018-03-19 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4145.nasl - Type: ACT_GATHER_INFO |
2018-01-18 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_65fab89f223146db8541978f4e87f32a.nasl - Type: ACT_GATHER_INFO |
2017-08-14 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_abcc5ad37e6a11e793f7d43d7e971a1b.nasl - Type: ACT_GATHER_INFO |