Goby/json/GitLab-CE-EE-Unauthenticate...

69 lines
4.3 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "GitLab CE/EE Unauthenticated RCE (CVE-2021-22205)",
"Description": "<p>GitLab is an open source project for a warehouse management system. It uses Git as a code management tool and builds a web service on this basis.</p><p>An issue has been discovered in GitLab CE/EE that affects all versions starting from 11.9. GitLab did not correctly validate the image file passed to the file parser, which resulted in remote command execution. An attacker can take over server permissions.</p>",
"Product": "GitLab",
"Homepage": "https://about.gitlab.com/",
"DisclosureDate": "2021-10-27",
"Author": "1291904552@qq.com",
"FofaQuery": "app=\"GitLab\"",
"GobyQuery": "app=\"GitLab\"",
"Level": "3",
"Impact": "<p>An issue has been discovered in GitLab CE/EE that affects all versions starting from 11.9. GitLab did not correctly validate the image file passed to the file parser, which resulted in remote command execution. An attacker can take over server permissions.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://packages.gitlab.com/gitlab/\">https://packages.gitlab.com/gitlab/</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>",
"Translation": {
"CN": {
"Name": "GitLab 未授权远程命令执行漏洞CVE-2021-22205",
"Product": "GitLab",
"VulType": ["命令执行"],
"Tags": ["命令执行"],
"Description": "<p>GitLab 是一个用于仓库管理系统的开源项目使用Git作为代码管理工具并在此基础上搭建起来的Web服务。</p><p>GitLab CE/EE 中发现了一个问题,影响从 11.9 开始的所有版本。GitLab 没有正确验证传递给文件解析器的图像文件,这导致远程命令执行。攻击者可接管服务器权限。</p>",
"Impact": "<p>GitLab CE/EE 中发现了一个问题,影响从 11.9 开始的所有版本。GitLab 没有正确验证传递给文件解析器的图像文件,这导致远程命令执行。攻击者可接管服务器权限。</p>",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新:<a href=\"https://packages.gitlab.com/gitlab/\">https://packages.gitlab.com/gitlab/</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、如⾮必要禁⽌公⽹访问该系统。</p>"
},
"EN": {
"Name": "GitLab CE/EE Unauthenticated RCE (CVE-2021-22205)",
"Product": "GitLab",
"VulType": ["rce"],
"Tags": ["rce"],
"Description": "<p>GitLab is an open source project for a warehouse management system. It uses Git as a code management tool and builds a web service on this basis.</p><p>An issue has been discovered in GitLab CE/EE that affects all versions starting from 11.9. GitLab did not correctly validate the image file passed to the file parser, which resulted in remote command execution. An attacker can take over server permissions.</p>",
"Impact": "<p>An issue has been discovered in GitLab CE/EE that affects all versions starting from 11.9. GitLab did not correctly validate the image file passed to the file parser, which resulted in remote command execution. An attacker can take over server permissions.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://packages.gitlab.com/gitlab/\">https://packages.gitlab.com/gitlab/</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2. If not necessary, prohibit public network access to the system.</p>"
}
},
"References": [
"https://about.gitlab.com/releases/2021/04/14/security-release-gitlab-13-10-3-released/"
],
"HasExp": true,
"ExpParams": [
{
"name": "AttackType",
"type": "select",
"value": "goby_shell_linux"
}
],
"ExpTips": null,
"ScanSteps": null,
"Tags": [
"rce"
],
"VulType": [
"rce"
],
"CVEIDs": [
"CVE-2021-22205"
],
"CVSSScore": "9.9",
"AttackSurfaces": {
"Application": ["GitLab"],
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"CNNVD": [
"CNNVD-202104-1685"
],
"CNVD": [
""
]
}