First published: Wed Mar 21 2018(Updated: )
Gitlab Community Edition version 10.3 is vulnerable to a lack of input validation in the system_hook_push queue through web hook component resulting in remote code execution.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gitlab | 16.0.8+ds1-2 | |
GitLab | >=8.8.0<=10.1.5 | |
GitLab | >=8.8.0<=10.1.5 | |
GitLab | >=10.2.0<=10.2.5 | |
GitLab | >=10.2.0<=10.2.5 | |
GitLab | >=10.3.0<=10.3.3 | |
GitLab | >=10.3.0<=10.3.3 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0916 is classified as a critical vulnerability due to the potential for remote code execution.
To mitigate CVE-2017-0916, upgrade GitLab to version 10.3.4 or later, or apply any available patches.
CVE-2017-0916 affects GitLab Community and Enterprise Editions from version 8.8.0 to 10.3.3.
CVE-2017-0916 involves a lack of input validation in the system_hook_push queue through the web hook component.
Yes, CVE-2017-0916 specifically impacts the web hook functionality within GitLab.