SB2020012826 - Multiple vulnerabilities in GitLab, Gitlab Community Edition
Published: January 28, 2020 Updated: July 17, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 vulnerabilities.
1) Inclusion of Functionality from Untrusted Control Sphere (CVE-ID: CVE-2013-4582)
The vulnerability allows a remote authenticated user to gain access to sensitive information.
The (1) create_branch, (2) create_tag, (3) import_project, and (4) fork_project functions in lib/gitlab_projects.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to include information from local files into the metadata of a Git repository via the web interface.
2) Improper Privilege Management (CVE-ID: CVE-2013-4583)
The vulnerability allows a remote authenticated user to execute arbitrary code.
The parse_cmd function in lib/gitlab_shell.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to gain privileges and clone arbitrary repositories.
Remediation
Install update from vendor's website.