CVE-2021-22199
https://notcve.org/view.php?id=CVE-2021-22199
An issue has been discovered in GitLab affecting all versions starting with 12.9. GitLab was vulnerable to a stored XSS if scoped labels were used. Se ha detectado un problema en GitLab que afecta a todas las versiones a partir de la 12.9. GitLab era vulnerable a un ataque de tipo XSS almacenado si etiquetas de ámbito eran usadas • https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22199.json https://gitlab.com/gitlab-org/gitlab/-/issues/291004 https://hackerone.com/reports/1050189 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-22202
https://notcve.org/view.php?id=CVE-2021-22202
An issue has been discovered in GitLab CE/EE affecting all previous versions. If the victim is an admin, it was possible to issue a CSRF in System hooks through the API. Se ha detectado un problema en GitLab CE/EE que afecta a todas las versiones anteriores. Si la víctima es un administrador, es posible facilitar un ataque de tipo CSRF en los enlaces del Sistema por medio de la API. • https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22202.json https://gitlab.com/gitlab-org/gitlab/-/issues/26017 https://hackerone.com/reports/471274 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2021-22200
https://notcve.org/view.php?id=CVE-2021-22200
An issue has been discovered in GitLab CE/EE affecting all versions starting with 12.6. Under a special condition it was possible to access data of an internal repository through a public project fork as an anonymous user. Se detecto un problema en GitLab CE/EE que afecta a todas las versiones a partir de la versión 12.6. Bajo una condición especial era posible acceder a los datos de un repositorio interno a través de un fork público del proyecto como usuario anónimo • https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22200.json https://gitlab.com/gitlab-org/gitlab/-/issues/247523 •
CVE-2021-22197
https://notcve.org/view.php?id=CVE-2021-22197
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.6 where an infinite loop exist when an authenticated user with specific rights access a MR having source and target branch pointing to each other Se ha detectado un problema en GitLab CE/EE que afecta a todas las versiones a partir de la 10.6, donde se presenta un bucle infinito cuando un usuario autenticado con derechos específicos accede a un MR que tiene la rama de origen y de destino apuntando entre sí. • https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22197.json https://gitlab.com/gitlab-org/gitlab/-/issues/323198 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
CVE-2021-22177
https://notcve.org/view.php?id=CVE-2021-22177
Potential DoS was identified in gitlab-shell in GitLab CE/EE version 12.6.0 or above, which allows an attacker to spike the server resource utilization via gitlab-shell command. Se identificó una DoS potencial en gitlab-shell en GitLab CE/EE versiones 12.6.0 o superiores, lo que permite a un atacante aumentar la utilización de recursos del servidor por medio del comando gitlab-shell. • https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22177.json https://gitlab.com/gitlab-org/gitlab/-/issues/238988 https://hackerone.com/reports/953444 • CWE-400: Uncontrolled Resource Consumption •