First published: Tue May 13 2014(Updated: )
The repository import feature in gitlab-shell before 1.7.4, as used in GitLab, allows remote authenticated users to execute arbitrary commands via the import URL.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | =5.0.0 | |
GitLab | =5.0.1 | |
GitLab | =5.1.0 | |
GitLab | =5.2.0 | |
GitLab | =5.3.0 | |
GitLab | =5.4.0 | |
GitLab | =5.4.1 | |
GitLab | =5.4.2 | |
GitLab | =6.0.0 | |
GitLab | =6.1.0 | |
GitLab | =6.2.0 | |
GitLab | =6.2.1 | |
GitLab | =6.2.2 | |
GitLab | <=1.7.3 | |
GitLab | =1.0.4 | |
GitLab | =1.1.0 | |
GitLab | =1.2.0 | |
GitLab | =1.3.0 | |
GitLab | =1.4.0 | |
GitLab | =1.5.0 | |
GitLab | =1.6.0 | |
GitLab | =1.7.0 | |
GitLab | =1.7.1 | |
GitLab | =1.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The potential impacts of CVE-2013-4546 include unauthorized command execution on the server, which may lead to data loss or compromise.