Lucene search

K
freebsdFreeBSD6E0EBB4A-5E75-11EE-A365-001B217B3468
HistorySep 28, 2023 - 12:00 a.m.

Gitlab -- vulnerabilities

2023-09-2800:00:00
vuxml.freebsd.org
10
attacker
vulnerabilities
group import
impersonation
code bypass
source code leaking
unauthorised association
asset proxy bypass
unauthorized member access

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.019 Low

EPSS

Percentile

88.5%

Attacker can add other projects policy bot as member to their own project and use that bot to trigger pipelines in victims project
Group import allows impersonation of users in CI pipelines
Developers can bypass code owners approval by changing a MR’s base branch
Leaking source code of restricted project through a fork
Third party library Consul requires enable-script-checks to be False to enable patch
Service account not deleted when namespace is deleted allowing access to internal projects
Enforce SSO settings bypassed for public projects for Members without identity
Removed project member can write to protected branches
Unauthorised association of CI jobs for Machine Learning experiments
Force pipelines to not have access to protected variables and will likely fail using tags
Maintainer can create a fork relationship between existing projects
Disclosure of masked CI variables via processing CI/CD configuration of forks
Asset Proxy Bypass using non-ASCII character in asset URI
Unauthorized member can gain Allowed to push and merge access and affect integrity of protected branches
Removed Developer can continue editing the source code of a public project
A project reporter can leak owner’s Sentry instance projects
Math rendering in markdown can escape container and hijack clicks

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchgitlab-ce= 16.4.0UNKNOWN
FreeBSDanynoarchgitlab-ce< 16.4.1UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.019 Low

EPSS

Percentile

88.5%