SB2020012826 - Multiple vulnerabilities in GitLab, Gitlab Community Edition



SB2020012826 - Multiple vulnerabilities in GitLab, Gitlab Community Edition

Published: January 28, 2020 Updated: July 17, 2020

Security Bulletin ID SB2020012826
CSH Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 vulnerabilities.


1) Inclusion of Functionality from Untrusted Control Sphere (CVE-ID: CVE-2013-4582)

The vulnerability allows a remote authenticated user to gain access to sensitive information.

The (1) create_branch, (2) create_tag, (3) import_project, and (4) fork_project functions in lib/gitlab_projects.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to include information from local files into the metadata of a Git repository via the web interface.


2) Improper Privilege Management (CVE-ID: CVE-2013-4583)

The vulnerability allows a remote authenticated user to execute arbitrary code.

The parse_cmd function in lib/gitlab_shell.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to gain privileges and clone arbitrary repositories.


Remediation

Install update from vendor's website.