An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://hackerone.com/reports/1154542 | third party advisory permissions required |
https://gitlab.com/gitlab-org/gitlab/-/issues/327121 | broken link |
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22205.json | vendor advisory |
http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html | third party advisory vdb entry exploit |
http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html | third party advisory vdb entry exploit |