// For flags

CVE-2021-22205

GitLab Community and Enterprise Editions Remote Code Execution Vulnerability

Severity Score

10.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

25
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.

Se ha detectado un problema en GitLab CE/EE que afecta a todas las versiones a partir de 11.9. GitLab no estaba comprobado apropiadamente archivos de imagen que fueron pasados a un analizador de archivos, lo que resultó en una ejecución de comando remoto

GitHub Community and Enterprise Editions that utilize the ability to upload images through GitLab Workhorse are vulnerable to remote code execution. Workhorse passes image file extensions through ExifTool, which improperly validates the image files.

*Credits: Thanks vakzz for reporting this vulnerability through our HackerOne bug bounty program
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-01-05 CVE Reserved
  • 2021-04-23 CVE Published
  • 2021-10-28 First Exploit
  • 2021-11-03 Exploited in Wild
  • 2021-11-17 KEV Due Date
  • 2024-08-03 CVE Updated
  • 2024-10-31 EPSS Updated
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (27)
URL Date SRC
https://www.exploit-db.com/exploits/50532 2021-11-17
https://github.com/Al1ex/CVE-2021-22205 2021-10-29
https://github.com/inspiringz/CVE-2021-22205 2022-01-16
https://github.com/mr-r3bot/Gitlab-CVE-2021-22205 2021-11-02
https://github.com/XTeam-Wing/CVE-2021-22205 2021-10-28
https://github.com/r0eXpeR/CVE-2021-22205 2021-10-28
https://github.com/whwlsfb/CVE-2021-22205 2021-10-30
https://github.com/c0okB/CVE-2021-22205 2022-07-04
https://github.com/Seals6/CVE-2021-22205 2021-11-04
https://github.com/antx-code/CVE-2021-22205 2021-11-04
https://github.com/keven1z/CVE-2021-22205 2022-07-25
https://github.com/runsel/GitLab-CVE-2021-22205- 2021-11-05
https://github.com/shang159/CVE-2021-22205-getshell 2021-11-01
https://github.com/faisalfs10x/GitLab-CVE-2021-22205-scanner 2021-11-12
https://github.com/pizza-power/Golang-CVE-2021-22205-POC 2021-11-25
https://github.com/cc3305/CVE-2021-22205 2024-07-27
https://github.com/Hikikan/CVE-2021-22205 2023-09-08
https://github.com/honypot/CVE-2021-22205 2022-02-19
https://github.com/hhhotdrink/CVE-2021-22205 2023-02-27
https://github.com/devdanqtuan/CVE-2021-22205 2024-01-20
https://github.com/w0x68y/Gitlab-CVE-2021-22205 2021-12-22
https://github.com/al4xs/CVE-2021-22205-gitlab 2021-11-03
https://github.com/overgrowncarrot1/DejaVu-CVE-2021-22205 2023-08-02
http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html 2024-08-03
http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html 2024-08-03
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gitlab
Search vendor "Gitlab"
Gitlab
Search vendor "Gitlab" for product "Gitlab"
>= 11.9.0 < 13.8.8
Search vendor "Gitlab" for product "Gitlab" and version " >= 11.9.0 < 13.8.8"
community
Affected
Gitlab
Search vendor "Gitlab"
Gitlab
Search vendor "Gitlab" for product "Gitlab"
>= 11.9.0 < 13.8.8
Search vendor "Gitlab" for product "Gitlab" and version " >= 11.9.0 < 13.8.8"
enterprise
Affected
Gitlab
Search vendor "Gitlab"
Gitlab
Search vendor "Gitlab" for product "Gitlab"
>= 13.9.0 < 13.9.6
Search vendor "Gitlab" for product "Gitlab" and version " >= 13.9.0 < 13.9.6"
community
Affected
Gitlab
Search vendor "Gitlab"
Gitlab
Search vendor "Gitlab" for product "Gitlab"
>= 13.9.0 < 13.9.6
Search vendor "Gitlab" for product "Gitlab" and version " >= 13.9.0 < 13.9.6"
enterprise
Affected
Gitlab
Search vendor "Gitlab"
Gitlab
Search vendor "Gitlab" for product "Gitlab"
>= 13.10.0 < 13.10.3
Search vendor "Gitlab" for product "Gitlab" and version " >= 13.10.0 < 13.10.3"
community
Affected
Gitlab
Search vendor "Gitlab"
Gitlab
Search vendor "Gitlab" for product "Gitlab"
>= 13.10.0 < 13.10.3
Search vendor "Gitlab" for product "Gitlab" and version " >= 13.10.0 < 13.10.3"
enterprise
Affected