Page 55 of 454 results (0.017 seconds)

CVSS: 10.0EPSS: 97%CPEs: 6EXPL: 25

An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution. Se ha detectado un problema en GitLab CE/EE que afecta a todas las versiones a partir de 11.9. GitLab no estaba comprobado apropiadamente archivos de imagen que fueron pasados a un analizador de archivos, lo que resultó en una ejecución de comando remoto GitHub Community and Enterprise Editions that utilize the ability to upload images through GitLab Workhorse are vulnerable to remote code execution. Workhorse passes image file extensions through ExifTool, which improperly validates the image files. • https://www.exploit-db.com/exploits/50532 https://github.com/Al1ex/CVE-2021-22205 https://github.com/inspiringz/CVE-2021-22205 https://github.com/mr-r3bot/Gitlab-CVE-2021-22205 https://github.com/XTeam-Wing/CVE-2021-22205 https://github.com/r0eXpeR/CVE-2021-22205 https://github.com/whwlsfb/CVE-2021-22205 https://github.com/c0okB/CVE-2021-22205 https://github.com/Seals6/CVE-2021-22205 https://github.com/antx-code/CVE-2021-22205 https://github.com/keven1z • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

An issue has been discovered in GitLab CE/EE affecting all previous versions. If the victim is an admin, it was possible to issue a CSRF in System hooks through the API. Se ha detectado un problema en GitLab CE/EE que afecta a todas las versiones anteriores. Si la víctima es un administrador, es posible facilitar un ataque de tipo CSRF en los enlaces del Sistema por medio de la API. • https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22202.json https://gitlab.com/gitlab-org/gitlab/-/issues/26017 https://hackerone.com/reports/471274 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.7EPSS: 0%CPEs: 6EXPL: 0

In all versions of GitLab, marshalled session keys were being stored in Redis. En todas las versiones de GitLab, las claves de sesión marshalled estaban siendo almacenadas en Redis • https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22194.json https://gitlab.com/gitlab-org/gitlab/-/issues/262107 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 3.5EPSS: 0%CPEs: 6EXPL: 2

An issue has been discovered in GitLab affecting all versions starting with 7.1. A member of a private group was able to validate the use of a specific name for private project. Se ha detectado un problema en GitLab que afecta a todas las versiones a partir de 7.1. Un miembro de un grupo privado pudo ser capaz de comprobar el uso de un nombre específico para un proyecto privado • https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22193.json https://gitlab.com/gitlab-org/gitlab/-/issues/12560 https://hackerone.com/reports/605608 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

A vulnerability was discovered in GitLab versions before 12.2. GitLab was vulnerable to a SSRF attack through the Outbound Requests feature. Se detectó una vulnerabilidad en GitLab versiones anteriores a 12.2. GitLab era vulnerable a un ataque de tipo SSRF por medio de la funcionalidad Outbound Requests • https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22179.json https://gitlab.com/gitlab-org/gitlab/-/issues/293733 https://hackerone.com/reports/1055816 • CWE-918: Server-Side Request Forgery (SSRF) •