Remote Code Execution Vulnerability in GitLab Community Edition by GitLab
CVE-2017-0915

9.8CRITICAL

Key Information:

Vendor
Gitlab
Vendor
CVE Published:
21 March 2018

Summary

A severe vulnerability exists in GitLab Community Edition version 10.2.4 due to inadequate input validation in the GitlabProjectsImportService. This flaw allows an attacker to execute arbitrary code remotely on the affected system, potentially compromising the integrity and security of the application and its data.

Affected Version(s)

GitLab Community and Enterprise Editions 8.9 - 10.1.5 Fixed in 10.1.6

GitLab Community and Enterprise Editions 10.2.0 - 10.2.5 Fixed in 10.2.6

GitLab Community and Enterprise Editions 10.3.0 - 10.3.3 Fixed in 10.3.4

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.