CVE-2022-2592
https://notcve.org/view.php?id=CVE-2022-2592
A lack of length validation in Snippet descriptions in GitLab CE/EE affecting all versions prior to 15.1.6, 15.2 prior to 15.2.4 and 15.3 prior to 15.3.2 allows an authenticated attacker to create a maliciously large Snippet which when requested with or without authentication places excessive load on the server, potential leading to Denial of Service. Una falta de comprobación de la longitud en las descripciones de Snippet en GitLab CE/EE afectando a todas las versiones anteriores a 15.1.6, 15.2 anteriores a 15.2.4 y 15.3 anteriores a 15.3.2, permite a un atacante autenticado crear un Snippet maliciosamente grande que cuando son solicitados con o sin autenticación pone una carga excesiva en el servidor, lo que puede conllevar a una denegación de servicio • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2592.json https://gitlab.com/gitlab-org/gitlab/-/issues/362566 https://hackerone.com/reports/1544507 • CWE-1284: Improper Validation of Specified Quantity in Input •
CVE-2022-3030
https://notcve.org/view.php?id=CVE-2022-3030
An improper access control issue in GitLab CE/EE affecting all versions starting before 15.1.6, all versions from 15.2 before 15.2.4, all versions from 15.3 before 15.3.2 allows disclosure of pipeline status to unauthorized users. Un problema de control de acceso inapropiado en GitLab CE/EE afectando a todas las versiones a partir de 15.1.6, a todas las versiones a partir de 15.2 anteriores a 15.2.4, a todas las versiones a partir de 15.3 anteriores a 15.3.2 permite revelar el estado de las tuberías a usuarios no autorizados • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3030.json https://gitlab.com/gitlab-org/gitlab/-/issues/37959 https://hackerone.com/reports/749882 •
CVE-2022-3288
https://notcve.org/view.php?id=CVE-2022-3288
A branch/tag name confusion in GitLab CE/EE affecting all versions prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows an attacker to manipulate pages where the content of the default branch would be expected. Una confusión de nombre de rama/etiqueta en GitLab CE/EE afectando a todas las versiones anteriores a 15.2.5, a la 15.3 anteriores a 15.3.4 y a la 15.4 anteriores a 15.4.1 permite a un atacante manipular páginas donde era esperado el contenido de la rama por defecto • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3288.json https://gitlab.com/gitlab-org/gitlab/-/issues/354948 https://hackerone.com/reports/1498354 •
CVE-2022-2992 – GitLab GitHub Repo Import Deserialization Remote Code Execution
https://notcve.org/view.php?id=CVE-2022-2992
A vulnerability in GitLab CE/EE affecting all versions from 11.10 prior to 15.1.6, 15.2 to 15.2.4, 15.3 to 15.3.2 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint. Una vulnerabilidad en GitLab CE/EE afectando a todas las versiones desde la 11.10 anteriores a 15.1.6, desde la 15.2 hasta la 15.2.4, desde la 15.3 hasta la 15.3.2 permite a un usuario autenticado lograr la ejecución de código remota por medio del endpoint de la API Import from GitHub An authenticated user can import a repository from GitHub into GitLab. If a user attempts to import a repo from an attacker-controlled server, the server will reply with a Redis serialization protocol object in the nested default_branch. GitLab will cache this object and then deserialize it when trying to load a user session, resulting in remote code execution. • https://github.com/CsEnox/CVE-2022-2992 https://github.com/Malwareman007/CVE-2022-2992 http://packetstormsecurity.com/files/171008/GitLab-GitHub-Repo-Import-Deserialization-Remote-Code-Execution.html https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2992.json https://gitlab.com/gitlab-org/gitlab/-/issues/371884 https://hackerone.com/reports/1679624 https://github.com/redwaysecurity/CVEs/tree/main/CVE-2022-2992 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2022-3279
https://notcve.org/view.php?id=CVE-2022-3279
An unhandled exception in job log parsing in GitLab CE/EE affecting all versions prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows an attacker to prevent access to job logs Una excepción no manejada en el análisis del registro de trabajos en GitLab CE/EE afectando a todas las versiones anteriores a 15.2.5, a la 15.3 anteriores a 15.3.4 y a la 15.4 anteriores a 15.4.1 permite a un atacante impedir el acceso a los registros de trabajos • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3279.json https://gitlab.com/gitlab-org/gitlab/-/issues/364249 https://hackerone.com/reports/1587261 • CWE-755: Improper Handling of Exceptional Conditions •