CVE-2016-9086
https://notcve.org/view.php?id=CVE-2016-9086
03 Nov 2016 — GitLab versions 8.9.x and above contain a critical security flaw in the "import/export project" feature of GitLab. Added in GitLab 8.9, this feature allows a user to export and then re-import their projects as tape archive files (tar). All GitLab versions prior to 8.13.0 restricted this feature to administrators only. Starting with version 8.13.0 this feature was made available to all users. This feature did not properly check for symbolic links in user-provided archives and therefore it was possible for an... • http://www.securityfocus.com/bid/94136 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2016-4340 – GitLab - 'impersonate' Feature Privilege Escalation
https://notcve.org/view.php?id=CVE-2016-4340
16 Aug 2016 — The impersonate feature in Gitlab 8.7.0, 8.6.0 through 8.6.7, 8.5.0 through 8.5.11, 8.4.0 through 8.4.9, 8.3.0 through 8.3.8, and 8.2.0 through 8.2.4 allows remote authenticated users to "log in" as any other user via unspecified vectors. La característica de suplantación en Gitlab 8.7.0, 8.6.0 hasta la versión 8.6.7, 8.5.0 hasta la versión 8.5.11, 8.4.0 hasta la versión 8.4.9, 8.3.0 hasta la versión 8.3.8 y 8.2.0 hasta la versión 8.2.4 permite a usuarios remotos autenticados para "iniciar sesión" como cual... • https://packetstorm.news/files/id/138368 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2013-4489
https://notcve.org/view.php?id=CVE-2013-4489
17 May 2014 — The Grit gem for Ruby, as used in GitLab 5.2 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands, as demonstrated by the search box for the GitLab code search feature. La gema Grit para Ruby, utilizado en GitLab 5.2 anterior a 5.4.1 y 6.x anterior a 6.2.3, permite a usuarios remotos autenticados ejecutar comandos arbitrarios, tal y como fue demostrado por el cuadro de búsqueda para la funcionalidad de búsqueda de código de GitLab. • https://www.gitlab.com/2013/11/04/gitlab-ce-6-2-and-5-4-security-release •
CVE-2013-4490 – Gitlab-shell - Code Execution
https://notcve.org/view.php?id=CVE-2013-4490
13 May 2014 — The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell before 1.7.3, as used in GitLab 5.0 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key. La funcionalidad de de subida de clave SSH (lib/gitlab_keys.rb) en gitlab-shell anterior a 1.7.3, utilizado en GitLab 5.0 anterior a 5.4.1 y 6.x anterior a 6.2.3, permite a usuarios remotos autenticados ejecutar comandos arbitrarios a través de metacaracteres de shell ... • https://packetstorm.news/files/id/127916 •
CVE-2014-3456
https://notcve.org/view.php?id=CVE-2014-3456
13 May 2014 — Cross-site scripting (XSS) vulnerability in GitLab Enterprise Edition (EE) 6.6.0 before 6.6.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de XSS en GitLab Enterprise Edition (EE) 6.6.0 anterior a 6.6.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de vectores no especificados. • https://www.gitlab.com/2014/02/27/gitlab-ee-6-6-2-security-release • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2013-4546
https://notcve.org/view.php?id=CVE-2013-4546
13 May 2014 — The repository import feature in gitlab-shell before 1.7.4, as used in GitLab, allows remote authenticated users to execute arbitrary commands via the import URL. La funcionalidad de importación de repositorios en gitlab-shell anterior a 1.7.4, utilizado en GitLab, permite a usuarios remotos autenticados ejecutar comandos arbitrarios a través de la URL de importación. • http://www.openwall.com/lists/oss-security/2013/11/11/2 •
CVE-2013-4581
https://notcve.org/view.php?id=CVE-2013-4581
12 May 2014 — GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote attackers to execute arbitrary code via a crafted change using SSH. GitLab 5.0 anterior a 5.4.2, Community Edition anterior a 6.2.4, Enterprise Edition anterior a 6.2.1 y gitlab-shell anterior a 1.7.8 permite a atacantes remotos ejecutar código arbitrario a través de un cambio manipulado que utiliza SSH. • http://www.openwall.com/lists/oss-security/2013/11/15/4 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2013-4580
https://notcve.org/view.php?id=CVE-2013-4580
12 May 2014 — GitLab before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1, when using a MySQL backend, allows remote attackers to impersonate arbitrary users and bypass authentication via unspecified API calls. GitLab en versiones anteriores a 5.4.2, Community Edition en versiones anteriores a 6.2.4 y Enterprise Edition en versiones anteriores a 6.2.1, cuando se utiliza un backend MySQL, permite a atacantes remotos hacerse pasar por usuarios arbitrarios y eludir la autenticación a través de l... • http://www.openwall.com/lists/oss-security/2013/11/15/4 • CWE-287: Improper Authentication •
CVE-2013-7316 – Gitlab 6.0 - Persistent Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2013-7316
24 Jan 2014 — Cross-site scripting (XSS) vulnerability in GitLab 6.0 and other versions before 6.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted HTML file, as demonstrated by README.html. Vulnerabilidad de XSS en GitLab 6.0 y otras versiones anteriores a 6.5.0 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias a través de un archivo HTML manipulado, como es demostrado por README.html. • https://www.exploit-db.com/exploits/30329 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •