Количество 5 336
Количество 5 336
GHSA-g5f4-f74v-9j97
An issue has been discovered in GitLab affecting all versions starting from 12.6 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not correctly authenticating a user that had some certain amount of information which allowed an user to authenticate without a personal access token.
GHSA-g5cm-j62r-w7f5
Improper control of a resource identifier in Error Tracking in GitLab CE/EE affecting all versions from 12.7 allows an authenticated attacker to generate content which could cause a victim to make unintended arbitrary requests
GHSA-g592-5fxh-qhrv
An issue was discovered in GitLab Community and Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It has Insufficient Visual Distinction of Homoglyphs Presented to a User. IDN homographs and RTLO characters are rendered to unicode, which could be used for social engineering.
GHSA-g4wv-rqvc-h4jp
An issue was discovered in GitLab Community and Enterprise Edition 10.2 through 11.11. Multiple features contained Server-Side Request Forgery (SSRF) vulnerabilities caused by an insufficient validation to prevent DNS rebinding attacks.
GHSA-g4px-p74v-q4c7
Under very specific conditions a user could be impersonated using Gitlab shell. This vulnerability affects GitLab CE/EE 13.1 and later through 14.1.2, 14.0.7 and 13.12.9.
GHSA-g4c2-hhjc-4hgg
An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This was a bypass of [CVE-2023-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932) showing additional impact.
GHSA-g3q8-7g5m-j8cw
GitLab EE 11.0 and later through 12.7.2 allows XSS.
GHSA-g3jp-2gfc-xjq6
A blind SSRF vulnerability was identified in all versions of GitLab EE prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1 which allows an attacker to connect to a local host.
GHSA-g349-hgx7-9cj9
An issue was discovered in GitLab CE/EE affecting all versions before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1 that allows unauthenticated users to cause a Denial of Service (DoS) condition while uploading specifically crafted large JSON files.
GHSA-fx2p-8vp5-7hx7
An Incorrect Access Control issue was discovered in GitLab Community and Enterprise Edition 11.7.x before 11.7.4. GitLab Releases were vulnerable to an authorization issue that allowed users to view confidential issue and merge request titles of other projects.
GHSA-fwr7-9543-4584
Gitlab Enterprise Edition version 10.1.0 is vulnerable to an insufficiently protected credential issue in the project service integration API endpoint resulting in an information disclosure of plaintext password.
GHSA-fvw3-2rq4-x8qv
GitLab Community and Enterprise Edition before 11.3.14, 11.4.x before 11.4.12, and 11.5.x before 11.5.5 allows Directory Traversal.
GHSA-fvvr-8pf3-2fhf
An issue was discovered in GitLab Community and Enterprise Edition through 12.2.1. Under certain circumstances, CI pipelines could potentially be used in a denial of service attack.
GHSA-fvhv-m54j-g33h
Gitlab Community and Enterprise Editions version 10.1, 10.2, and 10.2.4 are vulnerable to a SQL injection in the MilestoneFinder component resulting in disclosure of all data in a GitLab instance's database.
GHSA-fv9w-2hpj-4q5w
A business logic issue in the handling of large repositories in all versions of GitLab CE/EE from 10.0 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2 allowed an authenticated and authorized user to exhaust server resources by importing a malicious project.
GHSA-fv26-qm6r-mmq5
An issue was discovered in GitLab CE/EE affecting all versions starting from 17.4 prior to 17.5.1, starting from 17.6 prior to 17.6.1, and starting from 17.7 prior to 17.7.1. Under certain conditions, access tokens may have been logged when API requests were made in a specific manner.
GHSA-frwx-hm63-346w
GitLab EE 12.2 has Insecure Permissions (issue 2 of 2).
GHSA-frm8-m8r5-fc6j
GitLab EE/CE 8.17 to 12.9 is vulnerable to information leakage when querying a merge request widget.
GHSA-fr8h-r296-xggf
An issue was discovered in GitLab CE/EE affecting all versions starting from 16.1 prior to 17.4.6, starting from 17.5 prior to 17.5.4, and starting from 17.6 prior to 17.6.2, injection of NEL headers in k8s proxy response could lead to session data exfiltration.
GHSA-fr4g-hmc7-w66h
A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions from 13.1 prior to 14.7.7, 14.8.0 prior to 14.8.5, and 14.9.0 prior to 14.9.2. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-g5f4-f74v-9j97 An issue has been discovered in GitLab affecting all versions starting from 12.6 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not correctly authenticating a user that had some certain amount of information which allowed an user to authenticate without a personal access token. | CVSS3: 3.7 | 0% Низкий | больше 3 лет назад | |
GHSA-g5cm-j62r-w7f5 Improper control of a resource identifier in Error Tracking in GitLab CE/EE affecting all versions from 12.7 allows an authenticated attacker to generate content which could cause a victim to make unintended arbitrary requests | CVSS3: 7.3 | 0% Низкий | больше 3 лет назад | |
GHSA-g592-5fxh-qhrv An issue was discovered in GitLab Community and Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It has Insufficient Visual Distinction of Homoglyphs Presented to a User. IDN homographs and RTLO characters are rendered to unicode, which could be used for social engineering. | 0% Низкий | больше 3 лет назад | ||
GHSA-g4wv-rqvc-h4jp An issue was discovered in GitLab Community and Enterprise Edition 10.2 through 11.11. Multiple features contained Server-Side Request Forgery (SSRF) vulnerabilities caused by an insufficient validation to prevent DNS rebinding attacks. | 0% Низкий | больше 3 лет назад | ||
GHSA-g4px-p74v-q4c7 Under very specific conditions a user could be impersonated using Gitlab shell. This vulnerability affects GitLab CE/EE 13.1 and later through 14.1.2, 14.0.7 and 13.12.9. | 0% Низкий | больше 3 лет назад | ||
GHSA-g4c2-hhjc-4hgg An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This was a bypass of [CVE-2023-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932) showing additional impact. | CVSS3: 9.6 | 0% Низкий | больше 2 лет назад | |
GHSA-g3q8-7g5m-j8cw GitLab EE 11.0 and later through 12.7.2 allows XSS. | 0% Низкий | больше 3 лет назад | ||
GHSA-g3jp-2gfc-xjq6 A blind SSRF vulnerability was identified in all versions of GitLab EE prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1 which allows an attacker to connect to a local host. | CVSS3: 4.3 | 0% Низкий | около 3 лет назад | |
GHSA-g349-hgx7-9cj9 An issue was discovered in GitLab CE/EE affecting all versions before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1 that allows unauthenticated users to cause a Denial of Service (DoS) condition while uploading specifically crafted large JSON files. | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
GHSA-fx2p-8vp5-7hx7 An Incorrect Access Control issue was discovered in GitLab Community and Enterprise Edition 11.7.x before 11.7.4. GitLab Releases were vulnerable to an authorization issue that allowed users to view confidential issue and merge request titles of other projects. | 0% Низкий | больше 3 лет назад | ||
GHSA-fwr7-9543-4584 Gitlab Enterprise Edition version 10.1.0 is vulnerable to an insufficiently protected credential issue in the project service integration API endpoint resulting in an information disclosure of plaintext password. | CVSS3: 7.2 | 0% Низкий | больше 3 лет назад | |
GHSA-fvw3-2rq4-x8qv GitLab Community and Enterprise Edition before 11.3.14, 11.4.x before 11.4.12, and 11.5.x before 11.5.5 allows Directory Traversal. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-fvvr-8pf3-2fhf An issue was discovered in GitLab Community and Enterprise Edition through 12.2.1. Under certain circumstances, CI pipelines could potentially be used in a denial of service attack. | 0% Низкий | больше 3 лет назад | ||
GHSA-fvhv-m54j-g33h Gitlab Community and Enterprise Editions version 10.1, 10.2, and 10.2.4 are vulnerable to a SQL injection in the MilestoneFinder component resulting in disclosure of all data in a GitLab instance's database. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-fv9w-2hpj-4q5w A business logic issue in the handling of large repositories in all versions of GitLab CE/EE from 10.0 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2 allowed an authenticated and authorized user to exhaust server resources by importing a malicious project. | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
GHSA-fv26-qm6r-mmq5 An issue was discovered in GitLab CE/EE affecting all versions starting from 17.4 prior to 17.5.1, starting from 17.6 prior to 17.6.1, and starting from 17.7 prior to 17.7.1. Under certain conditions, access tokens may have been logged when API requests were made in a specific manner. | CVSS3: 6.5 | 0% Низкий | около 1 года назад | |
GHSA-frwx-hm63-346w GitLab EE 12.2 has Insecure Permissions (issue 2 of 2). | 0% Низкий | больше 3 лет назад | ||
GHSA-frm8-m8r5-fc6j GitLab EE/CE 8.17 to 12.9 is vulnerable to information leakage when querying a merge request widget. | 0% Низкий | больше 3 лет назад | ||
GHSA-fr8h-r296-xggf An issue was discovered in GitLab CE/EE affecting all versions starting from 16.1 prior to 17.4.6, starting from 17.5 prior to 17.5.4, and starting from 17.6 prior to 17.6.2, injection of NEL headers in k8s proxy response could lead to session data exfiltration. | CVSS3: 8.7 | 0% Низкий | около 1 года назад | |
GHSA-fr4g-hmc7-w66h A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions from 13.1 prior to 14.7.7, 14.8.0 prior to 14.8.5, and 14.9.0 prior to 14.9.2. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage. | CVSS3: 4.3 | 0% Низкий | почти 4 года назад |
Уязвимостей на страницу