diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 7603d7d53531..edb2e5581b48 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,60 @@ + + Gitlab -- Multiple Vulnerabilities + + + gitlab-ce + 15.10.015.10.1 + 15.9.015.9.4 + 8.115.8.5 + + + + +

Gitlab reports:

+
+

Cross-site scripting in "Maximum page reached" page

+

Private project guests can read new changes using a fork

+

Mirror repository error reveals password in Settings UI

+

DOS and high resource consumption of Prometheus server through abuse of Prometheus integration proxy endpoint

+

Unauthenticated users can view Environment names from public projects limited to project members only

+

Copying information to the clipboard could lead to the execution of unexpected commands

+

Maintainer can leak masked webhook secrets by adding a new parameter to the webhook URL

+

Arbitrary HTML injection possible when :soft_email_confirmation feature flag is enabled in the latest release

+

Framing of arbitrary content (leading to open redirects) on any page allowing user controlled markdown

+

MR for security reports are available to everyone

+

API timeout when searching for group issues

+

Unauthorised user can add child epics linked to victim's epic in an unrelated group

+

GitLab search allows to leak internal notes

+

Ambiguous branch name exploitation in GitLab

+

Improper permissions checks for moving an issue

+

Private project branches names can be leaked through a fork

+
+ +
+ + CVE-2022-3513 + CVE-2023-0485 + CVE-2023-1098 + CVE-2023-1733 + CVE-2023-0319 + CVE-2023-1708 + CVE-2023-0838 + CVE-2023-0523 + CVE-2023-0155 + CVE-2023-1167 + CVE-2023-1417 + CVE-2023-1710 + CVE-2023-0450 + CVE-2023-1071 + CVE-2022-3375 + https://about.gitlab.com/releases/2023/03/30/security-release-gitlab-15-10-1-released/ + + + 2023-03-30 + 2023-03-31 + +
+ rubygem-time -- ReDoS vulnerability