10

CVE-2021-22205

Warnung
Exploit
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GitlabGitlab SwEditioncommunity Version >= 11.9.0 < 13.8.8
GitlabGitlab SwEditionenterprise Version >= 11.9.0 < 13.8.8
GitlabGitlab SwEditioncommunity Version >= 13.9.0 < 13.9.6
GitlabGitlab SwEditionenterprise Version >= 13.9.0 < 13.9.6
GitlabGitlab SwEditioncommunity Version >= 13.10.0 < 13.10.3
GitlabGitlab SwEditionenterprise Version >= 13.10.0 < 13.10.3

03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog

GitLab Community and Enterprise Editions Remote Code Execution Vulnerability

Schwachstelle

GitHub Community and Enterprise Editions that utilize the ability to upload images through GitLab Workhorse are vulnerable to remote code execution. Workhorse passes image file extensions through ExifTool, which improperly validates the image files.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.47% 1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 10 3.9 6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
cve@gitlab.com 10 3.9 6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.