SB2018103004 - Multiple vulnerabilities in Gitlab Community Edition
Published: October 30, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2018-18649)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to insufficient validation of user-supplied input in wiki API. A remote attacker can supply specially crafted input, trigger unspecified flaw and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
2) Server-side request forgery (CVE-ID: CVE-2018-18646)
The vulnerability allows a remote user to perform SSRF attack.3) SQL injection (CVE-ID: CVE-2018-18641)
The disclosed vulnerability allows a remote attacker to execute arbitrary SQL commands in application database.
The vulnerability exists due to personal access tokens were being stored unencrypted as plain text in the database. A remote attacker can send a specially crafted request to vulnerable application and execute arbitrary SQL commands in application's database.
4) Cross-site scripting (CVE-ID: CVE-2018-18643)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to the fragment identifier (hash) of several pages in GitLab contained a lack of input validation and output encoding issue. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
5) Information disclosure (CVE-ID: CVE-2018-18648)
The disclosed vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a JSON endpoint was disclosing Gem version information. A remote attacker can supply stack trace error message and discover vulnerable Gems available on a specific GitLab instance.
6) Information disclosure (CVE-ID: CVE-2018-18640)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.7) Information disclosure (CVE-ID: CVE-2018-18645)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.8) Cross-site scripting (CVE-ID: CVE-2018-18642)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to the license management and security reports pages contained a lack of input validation and output encoding issue. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
9) Information disclosure (CVE-ID: CVE-2018-18644)
The disclosed vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to an indirect object reference issue in the GitLab Prometheus integration. A remote attacker can gain access to data including project name, environment name, metric name, and metric query.
10) Security restrictions bypass (CVE-ID: CVE-2018-18647)
The disclosed vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to an error in the protected_branches api. A remote attacker can remove the merge_access_levels and push_access_levels objects that may lead to the inability of project participants to push or merge into the branch.
Remediation
Install update from vendor's website.