Gitlab : Security Vulnerabilities CVSS score >= 9
An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This was a bypass of [CVE-2023-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932) showing additional impact.
Max Base Score | 9.8 |
Published | 2023-09-19 |
Updated | 2023-10-03 |
EPSS | 0.13% |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.9 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible to takeover GitLab Pages with unique domain URLs if the random string added was known.
Max Base Score | 9.8 |
Published | 2023-08-03 |
Updated | 2023-08-07 |
EPSS | 0.13% |
An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
Max Base Score | 10.0 |
Published | 2023-05-26 |
Updated | 2023-05-29 |
EPSS | 2.65% |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.9.7, all versions starting from 15.10 before 15.10.6, all versions starting from 15.11 before 15.11.2. Under certain conditions, a malicious unauthorized GitLab user may use a GraphQL endpoint to attach a malicious runner to any project.
Max Base Score | 9.6 |
Published | 2023-05-08 |
Updated | 2023-05-15 |
EPSS | 0.06% |
An issue was identified in GitLab CE/EE affecting all versions from 1.0 prior to 15.8.5, 15.9 prior to 15.9.4, and 15.10 prior to 15.10.1 where non-printable characters gets copied from clipboard, allowing unexpected commands to be executed on victim machine.
Max Base Score | 9.8 |
Published | 2023-04-05 |
Updated | 2023-04-12 |
EPSS | 0.12% |
Lack of sand-boxing of OpenAPI documents in GitLab CE/EE affecting all versions from 12.6 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to trick a user to click on the Swagger OpenAPI viewer and issue HTTP requests that affect the victim's account.
Max Base Score | 9.0 |
Published | 2022-11-10 |
Updated | 2022-11-11 |
EPSS | 0.08% |
A cross-site scripting issue has been discovered in GitLab CE/EE affecting all versions from 13.5 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. It was possible to exploit a vulnerability in setting the Jira Connect integration which could lead to a reflected XSS that allowed attackers to perform arbitrary actions on behalf of victims.
Max Base Score | 9.3 |
Published | 2023-01-26 |
Updated | 2023-02-01 |
EPSS | 0.11% |
CVE-2022-2992
Public exploit exists
A vulnerability in GitLab CE/EE affecting all versions from 11.10 prior to 15.1.6, 15.2 to 15.2.4, 15.3 to 15.3.2 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint.
Max Base Score | 9.9 |
Published | 2022-10-17 |
Updated | 2023-02-15 |
EPSS | 5.65% |
A vulnerability in GitLab CE/EE affecting all versions from 11.3.4 prior to 15.1.5, 15.2 to 15.2.3, 15.3 to 15.3 to 15.3.1 allows an an authenticated user to achieve remote code execution via the Import from GitHub API endpoint
Max Base Score | 9.9 |
Published | 2022-10-17 |
Updated | 2023-04-03 |
EPSS | 0.32% |
An issue has been discovered in GitLab affecting all versions starting from 10.0 before 12.9.8, all versions starting from 12.10 before 12.10.7, all versions starting from 13.0 before 13.0.1. TODO
Max Base Score | 9.8 |
Published | 2022-10-28 |
Updated | 2022-11-01 |
EPSS | 0.10% |
A critical issue has been discovered in GitLab affecting all versions starting from 14.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 where an authenticated user authorized to import projects could import a maliciously crafted project leading to remote code execution.
Max Base Score | 9.9 |
Published | 2022-07-01 |
Updated | 2022-10-29 |
EPSS | 50.50% |
An account takeover issue has been discovered in GitLab EE affecting all versions starting from 11.10 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1. When group SAML SSO is configured, the SCIM feature (available only on Premium+ subscriptions) may allow any owner of a Premium group to invite arbitrary users through their username and email, then change those users' email addresses via SCIM to an attacker controlled email address and thus - in the absence of 2FA - take over those accounts. It is also possible for the attacker to change the display name and username of the targeted account.
Max Base Score | 9.9 |
Published | 2022-06-06 |
Updated | 2022-06-17 |
EPSS | 0.15% |
A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts
Max Base Score | 9.8 |
Published | 2022-04-04 |
Updated | 2022-04-27 |
EPSS | 17.76% |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.10 before 14.6.5, all versions starting from 14.7 before 14.7.4, all versions starting from 14.8 before 14.8.2. An unauthorised user was able to steal runner registration tokens through an information disclosure vulnerability using quick actions commands.
Max Base Score | 10.0 |
Published | 2022-03-28 |
Updated | 2022-04-04 |
EPSS | 2.76% |
A vulnerability was discovered in GitLab starting with version 12. GitLab was vulnerable to a blind SSRF attack since requests to shared address space were not blocked.
Max Base Score | 9.1 |
Published | 2022-03-28 |
Updated | 2022-04-04 |
EPSS | 0.15% |
It was possible to bypass 2FA for LDAP users and access some specific pages with Basic Authentication in GitLab 14.1.1 and above.
Max Base Score | 9.8 |
Published | 2021-12-06 |
Updated | 2021-12-07 |
EPSS | 0.21% |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.11 before 13.11.7, all versions starting from 13.12 before 13.12.8, and all versions starting from 14.0 before 14.0.4. A specially crafted design image allowed attackers to read arbitrary files on the server.
Max Base Score | 9.6 |
Published | 2021-08-05 |
Updated | 2022-07-22 |
EPSS | 0.07% |
CVE-2021-22205
Public exploit exists
Known Exploited Vulnerability
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
Max Base Score | 10.0 |
Published | 2021-04-23 |
Updated | 2022-07-12 |
EPSS | 97.26% |
KEV Added | 2021-11-03 |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7.9 before 13.8.7, all versions starting from 13.9 before 13.9.5, and all versions starting from 13.10 before 13.10.1. A specially crafted Wiki page allowed attackers to read arbitrary files on the server.
Max Base Score | 9.8 |
Published | 2021-04-02 |
Updated | 2022-07-22 |
EPSS | 0.29% |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.9. A specially crafted import file could read files on the server.
Max Base Score | 9.6 |
Published | 2021-04-02 |
Updated | 2021-04-07 |
EPSS | 0.11% |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 allowing unauthorized authenticated users to execute arbitrary code on the server.
Max Base Score | 9.9 |
Published | 2021-03-24 |
Updated | 2021-03-26 |
EPSS | 32.68% |
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled
Max Base Score | 9.8 |
Published | 2021-06-11 |
Updated | 2021-06-21 |
EPSS | 0.61% |
A command injection vulnerability was discovered in Gitlab runner versions prior to 13.2.4, 13.3.2 and 13.4.1. When the runner is configured on a Windows system with a docker executor, which allows the attacker to run arbitrary commands on Windows host, via DOCKER_AUTH_CONFIG build variable.
Max Base Score | 9.1 |
Published | 2020-10-07 |
Updated | 2021-07-21 |
EPSS | 0.85% |
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab OAuth endpoint was vulnerable to brute-force attacks through a specific parameter.
Max Base Score | 9.8 |
Published | 2020-09-14 |
Updated | 2021-07-21 |
EPSS | 0.24% |
GitLab CE/EE version 13.3 prior to 13.3.4 was vulnerable to an OAuth authorization scope change without user consent in the middle of the authorization flow.
Max Base Score | 10.0 |
Published | 2020-09-14 |
Updated | 2023-02-03 |
EPSS | 0.16% |