GitLab Community and Enterprise Edition before 10.7.7, 10.8.x before 10.8.6, and 11.x before 11.0.4 allows Directory Traversal with write access and resultant remote code execution via the GitLab projects import component.
References
Link | Resource |
---|---|
https://about.gitlab.com/2018/07/17/critical-security-release-gitlab-11-dot-0-dot-4-released/ | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab-ce/issues/49133 | Exploit Vendor Advisory |
https://hackerone.com/reports/378148 | Exploit Third Party Advisory |
https://about.gitlab.com/2018/07/17/critical-security-release-gitlab-11-dot-0-dot-4-released/ | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab-ce/issues/49133 | Exploit Vendor Advisory |
https://hackerone.com/reports/378148 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://about.gitlab.com/2018/07/17/critical-security-release-gitlab-11-dot-0-dot-4-released/ - Vendor Advisory | |
References | () https://gitlab.com/gitlab-org/gitlab-ce/issues/49133 - Exploit, Vendor Advisory | |
References | () https://hackerone.com/reports/378148 - Exploit, Third Party Advisory |
Information
Published : 2018-07-18 19:29
Updated : 2024-11-21 03:48
NVD link : CVE-2018-14364
Mitre link : CVE-2018-14364
CVE.ORG link : CVE-2018-14364
JSON object : View
Products Affected
gitlab
- gitlab
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')