Gitlab Community Edition version 10.3 is vulnerable to a lack of input validation in the system_hook_push queue through web hook component resulting in remote code execution.
References
Link | Resource |
---|---|
https://about.gitlab.com/2018/01/16/gitlab-10-dot-3-dot-4-released/ | Vendor Advisory |
https://hackerone.com/reports/299473 | Permissions Required |
https://www.debian.org/security/2018/dsa-4145 | Third Party Advisory |
https://about.gitlab.com/2018/01/16/gitlab-10-dot-3-dot-4-released/ | Vendor Advisory |
https://hackerone.com/reports/299473 | Permissions Required |
https://www.debian.org/security/2018/dsa-4145 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://about.gitlab.com/2018/01/16/gitlab-10-dot-3-dot-4-released/ - Vendor Advisory | |
References | () https://hackerone.com/reports/299473 - Permissions Required | |
References | () https://www.debian.org/security/2018/dsa-4145 - Third Party Advisory |
Information
Published : 2018-03-21 20:29
Updated : 2024-11-21 03:03
NVD link : CVE-2017-0916
Mitre link : CVE-2017-0916
CVE.ORG link : CVE-2017-0916
JSON object : View
Products Affected
gitlab
- gitlab
debian
- debian_linux