First published: Sat May 17 2014(Updated: )
The Grit gem for Ruby, as used in GitLab 5.2 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands, as demonstrated by the search box for the GitLab code search feature.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | =5.2.0 | |
GitLab | =5.3.0 | |
GitLab | =5.4.0 | |
GitLab | =6.0.0 | |
GitLab | =6.1.0 | |
GitLab | =6.2.0 | |
GitLab | =6.2.1 | |
GitLab | =6.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4489 has a high severity rating due to its potential for remote command execution by authenticated users.
To fix CVE-2013-4489, you should upgrade GitLab to version 5.4.1 or later for the 5.x series, and version 6.2.3 or later for the 6.x series.
CVE-2013-4489 affects GitLab versions 5.2.0 to 5.4.0 and 6.0.0 to 6.2.2.
CVE-2013-4489 allows attackers to perform arbitrary command execution through the GitLab code search feature.
Yes, CVE-2013-4489 requires remote authenticated users to exploit the vulnerability.