#VU52499 OS Command Injection in Gitlab Community Edition and GitLab Enterprise Edition - CVE-2021-22205

 

#VU52499 OS Command Injection in Gitlab Community Edition and GitLab Enterprise Edition - CVE-2021-22205

Published: April 22, 2021 / Updated: May 23, 2024


Vulnerability identifier: #VU52499
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Green
CVE-ID: CVE-2021-22205
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
Gitlab Community Edition
GitLab Enterprise Edition
Software vendor:
GitLab, Inc

Description

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation within image parser when processing image files. A remote authenticated user can upload a specially crafted image file to the system and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links