Date: Thu, 13 Jan 2022 11:46:47 GMT From: Matthias Fechner <mfechner@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 7f9670164cc5 - main - security/vuxml: document www/gitlab-ce vulnerabilities Message-ID: <202201131146.20DBklOn055691@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by mfechner: URL: https://cgit.FreeBSD.org/ports/commit/?id=7f9670164cc58a6f83f9bcaa15d674203ff55280 commit 7f9670164cc58a6f83f9bcaa15d674203ff55280 Author: Matthias Fechner <mfechner@FreeBSD.org> AuthorDate: 2022-01-12 13:40:43 +0000 Commit: Matthias Fechner <mfechner@FreeBSD.org> CommitDate: 2022-01-13 11:46:14 +0000 security/vuxml: document www/gitlab-ce vulnerabilities --- security/vuxml/vuln-2022.xml | 49 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 49 insertions(+) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index 8dbd45f6186e..1d4b1445c96a 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -65,6 +65,55 @@ </dates> </vuln> + <vuln vid="43f84437-73ab-11ec-a587-001b217b3468"> + <topic>Gitlab -- Multiple Vulnerabilities</topic> + <affects> + <package> + <name>gitlab-ce</name> + <range><ge>14.6.0</ge><lt>14.6.2</lt></range> + <range><ge>14.5.0</ge><lt>14.5.3</lt></range> + <range><ge>7.7</ge><lt>14.4.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Gitlab reports:</p> + <blockquote cite="https://about.gitlab.com/releases/2022/01/11/security-release-gitlab-14-6-2-released/"> + <p>Arbitrary file read via group import feature</p> + <p>Stored XSS in notes</p> + <p>Lack of state parameter on GitHub import project OAuth</p> + <p>Vulnerability related fields are available to unauthorized users on GraphQL API</p> + <p>Deleting packages may cause table locks</p> + <p>IP restriction bypass via GraphQL</p> + <p>Repository content spoofing using Git replacement references</p> + <p>Users can import members from projects that they are not a maintainer on through API</p> + <p>Possibility to direct user to malicious site through Slack integration</p> + <p>Bypassing file size limits to the NPM package repository</p> + <p>User with expired password can still access sensitive information</p> + <p>Incorrect port validation allows access to services on ports 80 and 443 if GitLab is configured to run on another port</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2021-39946</cvename> + <cvename>CVE-2022-0154</cvename> + <cvename>CVE-2022-0152</cvename> + <cvename>CVE-2022-0151</cvename> + <cvename>CVE-2022-0172</cvename> + <cvename>CVE-2022-0090</cvename> + <cvename>CVE-2022-0125</cvename> + <cvename>CVE-2022-0124</cvename> + <cvename>CVE-2021-39942</cvename> + <cvename>CVE-2022-0093</cvename> + <cvename>CVE-2021-39927</cvename> + <url>https://about.gitlab.com/releases/2022/01/11/security-release-gitlab-14-6-2-released/</url> + </references> + <dates> + <discovery>2022-01-11</discovery> + <entry>2022-01-12</entry> + </dates> + </vuln> + <vuln vid="b927b654-7146-11ec-ad4b-5404a68ad561"> <topic>uriparser -- Multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202201131146.20DBklOn055691>