Vulnerability Details : CVE-2020-10977
Public exploit exists!
GitLab EE/CE 8.5 to 12.9 is vulnerable to a an path traversal when moving an issue between projects.
Vulnerability category: Directory traversal
Products affected by CVE-2020-10977
- Gitlab » Gitlab » Community EditionVersions from including (>=) 8.5.0 and up to, including, (<=) 12.9cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
- Gitlab » Gitlab » Enterprise EditionVersions from including (>=) 8.5.0 and up to, including, (<=) 12.9cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-10977
7.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2020-10977
-
GitLab File Read Remote Code Execution
Disclosure Date: 2020-03-26First seen: 2020-12-10exploit/multi/http/gitlab_file_read_rceThis module provides remote code execution against GitLab Community Edition (CE) and Enterprise Edition (EE). It combines an arbitrary file read to extract the Rails "secret_key_base", and gains remote code execution with a deserialization vulnerability of a
CVSS scores for CVE-2020-10977
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2020-10977
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-10977
-
https://about.gitlab.com/releases/categories/releases/
Releases | GitLabRelease Notes;Vendor Advisory
-
https://about.gitlab.com/releases/2020/03/26/security-release-12-dot-9-dot-1-released/
GitLab Security Release: 12.9.1, 12.8.8, and 12.7.8 | GitLabVendor Advisory
-
http://packetstormsecurity.com/files/160441/GitLab-File-Read-Remote-Code-Execution.html
GitLab File Read Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to