CVE-2020-36788 – Linux Kernel Vulnerability
May 28, 2024Multiple SAP NetWeaver Application Server Vulnerabilities
May 28, 2024CVE-2020-36788 – Linux Kernel Vulnerability
May 28, 2024Multiple SAP NetWeaver Application Server Vulnerabilities
May 28, 2024Severity
Medium
Analysis Summary
CVE-2024-1947 CVSS:4.3
GitLab Community Edition and Enterprise Edition is vulnerable to a denial of service, caused by resource exhaustion. By sending crafted API calls, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.
CVE-2024-5318 CVSS:4.3
GitLab Community Edition and Enterprise Edition could allow a remote authenticated attacker to obtain sensitive information. By sending a specially crafted request, a remote attacker could exploit this vulnerability to view dependency lists of private projects through job artifacts.
CVE-2023-6502 CVSS:4.3
GitLab Community Edition and Enterprise Edition is vulnerable to a denial of service, caused by ReDoS on wiki render API/Page. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.
CVE-2024-5258 CVSS:4.4
GitLab Community Edition and Enterprise Edition could allow a remote authenticated attacker to bypass security restrictions, caused by an authorization vulnerability. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass pipeline authorization logic.
CVE-2023-7045 CVSS:5.4
GitLab Community Edition and Enterprise Edition is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to exfiltrate anti-CSRF tokens. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2024-2874 CVSS:6.5
GitLab Community Edition and Enterprise Edition is vulnerable to a denial of service, caused by a flaw in the 'description' field of the runner. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.
CVE-2024-4835 CVSS:8
GitLab Community Edition and Enterprise Edition is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Impact
- Denial of Service
- Information Disclosure
- Security Bypass
- Gain Access
- Cross-Site Scripting
Indicators of Compromise
CVE
- CVE-2024-1947
- CVE-2024-5318
- CVE-2023-6502
- CVE-2024-5258
- CVE-2023-7045
- CVE-2024-2874
- CVE-2024-4835
Affected Vendors
Affected Products
- GitLab Community Edition 17.0.0
- GitLab Community Edition 16.11.2
- GitLab Community Edition 16.10.5
- GitLab Enterprise Edition 16.10.5
- GitLab Enterprise Edition 16.11.2
- GitLab Enterprise Edition 17.0.0
Remediation
Upgrade to the latest version of GitLab Community Edition and Enterprise Edition, available from the GitLab Website.