Описание
An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
Ссылки
- Third Party Advisory
- Broken Link
- Permissions RequiredThird Party Advisory
- Third Party Advisory
- Broken Link
- Permissions RequiredThird Party Advisory
Уязвимые конфигурации
Одно из
EPSS
10 Critical
CVSS3
7.5 High
CVSS3
Дефекты
Связанные уязвимости
An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
An issue has been discovered in GitLab CE/EE affecting only version 16 ...
An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
Уязвимость программной платформы на базе git для совместной работы над кодом GitLab, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
EPSS
10 Critical
CVSS3
7.5 High
CVSS3