Описание
In GitLab EE 11.3 through 12.5.3, 12.4.5, and 12.3.8, insufficient parameter sanitization for the Maven package registry could lead to privilege escalation and remote code execution vulnerabilities under certain conditions.
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
disco | DNE | |
eoan | DNE | |
esm-apps/xenial | not-affected | |
esm-infra-legacy/trusty | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | debian: Only affects Gitlab EE |
Показывать по
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
In GitLab EE 11.3 through 12.5.3, 12.4.5, and 12.3.8, insufficient parameter sanitization for the Maven package registry could lead to privilege escalation and remote code execution vulnerabilities under certain conditions.
In GitLab EE 11.3 through 12.5.3, 12.4.5, and 12.3.8, insufficient par ...
In GitLab EE 11.3 through 12.5.3, 12.4.5, and 12.3.8, insufficient parameter sanitization for the Maven package registry could lead to privilege escalation and remote code execution vulnerabilities under certain conditions.
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3