Path traversal vulnerability in package upload functionality in GitLab CE/EE starting from 12.8 allows an attacker to save packages in arbitrary locations. Affected versions are >=12.8, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.
7.1CVSS
6.8AI Score
0.001EPSS
Certain SAST CiConfiguration information could be viewed by unauthorized users in GitLab EE starting with 13.3. This information was exposed through GraphQL to non-members of public projects with repository visibility restricted as well as guest members on private projects. Affected versions are: &...
5.3CVSS
4.8AI Score
0.001EPSS
A XSS vulnerability exists in Gitlab CE/EE from 12.4 before 13.4.7, 13.5 before 13.5.5, and 13.6 before 13.6.2 that allows an attacker to perform cross-site scripting to other users via importing a malicious project
5.5CVSS
5.1AI Score
0.001EPSS
A limited information disclosure vulnerability exists in Gitlab CE/EE from >= 12.2 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2 that allows an attacker to view limited information in user's private profile
5.3CVSS
5AI Score
0.001EPSS
A DOS vulnerability exists in Gitlab CE/EE >=10.3, <13.4.7,>=13.5, <13.5.5,>=13.6, <13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.
6.5CVSS
6.2AI Score
0.001EPSS
A potential DOS vulnerability was discovered in all versions of Gitlab starting from 13.4.x (>=13.4 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2). Using a specific query name for a project search can cause statement timeouts that can lead to a potential DOS if abused.
4.3CVSS
4.6AI Score
0.001EPSS
Removed group members were able to use the To-Do functionality to retrieve updated information on confidential epics starting in GitLab EE 13.2 before 13.6.2.
4.3CVSS
4.1AI Score
0.001EPSS
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4 before 13.6.2. Information disclosure via GraphQL results in user email being unexpectedly visible.
5.3CVSS
4.8AI Score
0.786EPSS
An issue has been discovered in GitLab affecting all versions starting from 12.4. The regex used for package names is written in a way that makes execution time have quadratic growth based on the length of the malicious input string.
6.5CVSS
6.3AI Score
0.001EPSS
Information about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab >=12.2 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2.
4.3CVSS
4.3AI Score
0.001EPSS
Information disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions >=8.4 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2.
4.4CVSS
4.3AI Score
0.0004EPSS
Information disclosure via GraphQL in GitLab CE/EE 13.1 and later exposes private group and project membership. This affects versions >=13.6 to <13.6.2, >=13.5 to <13.5.5, and >=13.1 to <13.4.7.
5.3CVSS
4.8AI Score
0.001EPSS
An issue was discovered in GitLab Community Edition (CE) and Enterprise Edition (EE) 5.1 through 12.6.1. It has Incorrect Access Control.
4.3CVSS
4.3AI Score
0.001EPSS
An issue was discovered in GitLab Enterprise Edition (EE) 8.9.0 through 12.6.1. Using the project import feature, it was possible for someone to obtain issues from private projects.
5.3CVSS
4.8AI Score
0.001EPSS
An issue was discovered in GitLab EE 11.3 and later. A GitLab Workhorse bypass could lead to package and file disclosure via request smuggling.
7.5CVSS
7.2AI Score
0.002EPSS
7.5CVSS
7.4AI Score
0.002EPSS
4.3CVSS
4.7AI Score
0.001EPSS
7.5CVSS
7.4AI Score
0.002EPSS
7.5CVSS
7.4AI Score
0.002EPSS
6.1CVSS
6.2AI Score
0.001EPSS
7.5CVSS
7.4AI Score
0.001EPSS
6.1CVSS
6.2AI Score
0.001EPSS
5.3CVSS
5.4AI Score
0.001EPSS
5.3CVSS
5.4AI Score
0.001EPSS
5.3CVSS
5.4AI Score
0.001EPSS
7.5CVSS
7.4AI Score
0.001EPSS
5.3CVSS
5.4AI Score
0.001EPSS
9.8CVSS
9.3AI Score
0.007EPSS
9.8CVSS
9.3AI Score
0.005EPSS
In GitLab Enterprise Edition (EE) 12.5.0 through 12.7.5, sharing a group with a group could grant project access to unauthorized users.
7.5CVSS
7.2AI Score
0.002EPSS
An attacker could cause a Prometheus denial of service in GitLab 13.7+ by sending an HTTP request with a malformed method
7.5CVSS
7AI Score
0.001EPSS
An issue has been discovered in GitLab affecting all versions starting from 12.1. Incorrect headers in specific project page allows attacker to have a temporary read access to the private repository
7.5CVSS
7AI Score
0.002EPSS
A regular expression denial of service issue has been discovered in NuGet API affecting all versions of GitLab starting from version 12.8.
6.5CVSS
6.3AI Score
0.001EPSS
An issue was identified in GitLab EE 13.4 or later which leaked internal IP address via error messages.
4.3CVSS
4.2AI Score
0.001EPSS
Assuming a database breach, nonce reuse issues in GitLab 11.6+ allows an attacker to decrypt some of the database's encrypted content
7.5CVSS
7.1AI Score
0.002EPSS
Insufficient validation of authentication parameters in GitLab Pages for GitLab 11.5+ allows an attacker to steal a victim's API token if they click on a maliciously crafted link
7.3CVSS
6.3AI Score
0.002EPSS
Improper authorization in GitLab 12.8+ allows a guest user in a private project to view tag data that should be inaccessible on the releases page
4.3CVSS
4.1AI Score
0.001EPSS
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled
9.8CVSS
9.2AI Score
0.008EPSS
An issue has been discovered in GitLab affecting all versions starting with 3.0.1. Improper access control allows demoted project members to access details on authored merge requests
4.3CVSS
4.2AI Score
0.001EPSS
Potential DoS was identified in gitlab-shell in GitLab CE/EE version 12.6.0 or above, which allows an attacker to spike the server resource utilization via gitlab-shell command.
4.3CVSS
4.2AI Score
0.001EPSS
An issue has been discovered in GitLab affecting all versions starting from 13.2. Gitlab was vulnerable to SRRF attack through the Prometheus integration.
5CVSS
4.7AI Score
0.001EPSS
A vulnerability was discovered in GitLab versions before 12.2. GitLab was vulnerable to a SSRF attack through the Outbound Requests feature.
5.4CVSS
5AI Score
0.001EPSS
An issue has been discovered in GitLab affecting all versions starting from 13.4. Improper access control allows unauthorized users to access details on analytic pages.
4.3CVSS
4.1AI Score
0.001EPSS
A denial of service vulnerability in GitLab CE/EE affecting all versions since 11.8 allows an attacker to create a recursive pipeline relationship and exhaust resources.
7.7CVSS
6.2AI Score
0.001EPSS
An issue has been discovered in GitLab affecting all versions starting with 13.7. GitLab was vulnerable to a stored XSS in merge request.
5.4CVSS
4.8AI Score
0.001EPSS
An issue has been discovered in GitLab affecting all versions starting with 11.8. GitLab was vulnerable to a stored XSS in the epics page, which could be exploited with user interactions.
5.4CVSS
4.8AI Score
0.001EPSS
An information disclosure issue in GitLab starting from version 12.8 allowed a user with access to the server logs to see sensitive information that wasn't properly redacted.
6.2CVSS
4.7AI Score
0.0004EPSS
Insufficient input sanitization in wikis in GitLab version 13.8 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted commit to a wiki
5.4CVSS
4.8AI Score
0.001EPSS
An authorization issue in GitLab CE/EE version 9.4 and up allowed a group maintainer to modify group CI/CD variables which should be restricted to group owners
4.9CVSS
4.6AI Score
0.001EPSS
An issue has been discovered in GitLab affecting all versions of Gitlab EE/CE before 13.6.7. A potential resource exhaustion issue that allowed running or pending jobs to continue even after project was deleted.
4.3CVSS
4.2AI Score
0.001EPSS