Search criteria

15 vulnerabilities found for gitlab-shell by GitLab

FKIE_CVE-2013-4583

Vulnerability from fkie_nvd - Published: 2020-01-28 16:15 - Updated: 2024-11-21 01:55
Summary
The parse_cmd function in lib/gitlab_shell.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to gain privileges and clone arbitrary repositories.
Impacted products
Vendor Product Version
gitlab gitlab *
gitlab gitlab *
gitlab gitlab *
gitlab gitlab-shell *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC253A4-2439-48AB-A8EE-B5044C854BA8",
              "versionEndExcluding": "5.4.2",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "7EF97FC1-3CFD-4845-8FDE-030F03E44D9F",
              "versionEndExcluding": "6.2.1",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "EBF7F82C-67FB-456F-A8B5-5944124F7D42",
              "versionEndExcluding": "6.2.4",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEE8E666-9552-4559-9D80-B3F749F68AF7",
              "versionEndExcluding": "1.7.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The parse_cmd function in lib/gitlab_shell.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to gain privileges and clone arbitrary repositories."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n parse_cmd en el archivo lib/gitlab_shell.rb en GitLab versiones 5.0 anteriores a 5.4.2, Community Edition versiones anteriores a 6.2.4 y Enterprise Edition versiones anteriores a 6.2.1 y gitlab-shell versiones anteriores a 1.7.8, permite a usuarios autenticados remotos alcanzar privilegios y clonar repositorios arbitrarios ."
    }
  ],
  "id": "CVE-2013-4583",
  "lastModified": "2024-11-21T01:55:52.670",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-28T16:15:11.743",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-4582

Vulnerability from fkie_nvd - Published: 2020-01-28 16:15 - Updated: 2024-11-21 01:55
Summary
The (1) create_branch, (2) create_tag, (3) import_project, and (4) fork_project functions in lib/gitlab_projects.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to include information from local files into the metadata of a Git repository via the web interface.
Impacted products
Vendor Product Version
gitlab gitlab *
gitlab gitlab *
gitlab gitlab *
gitlab gitlab-shell *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC253A4-2439-48AB-A8EE-B5044C854BA8",
              "versionEndExcluding": "5.4.2",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "7EF97FC1-3CFD-4845-8FDE-030F03E44D9F",
              "versionEndExcluding": "6.2.1",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "EBF7F82C-67FB-456F-A8B5-5944124F7D42",
              "versionEndExcluding": "6.2.4",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEE8E666-9552-4559-9D80-B3F749F68AF7",
              "versionEndExcluding": "1.7.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The (1) create_branch, (2) create_tag, (3) import_project, and (4) fork_project functions in lib/gitlab_projects.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to include information from local files into the metadata of a Git repository via the web interface."
    },
    {
      "lang": "es",
      "value": "Las funciones (1) create_branch, (2) create_tag, (3) import_project y (4) fork_project en el archivo lib/gitlab_projects.rb en GitLab versiones 5.0 anteriores a 5.4.2, Community Edition versiones anteriores a 6.2.4, Enterprise Edition versiones anteriores a 6.2.1 y gitlab-shell versiones anteriores a 1.7.8, permite a usuarios autenticados remotos incluir informaci\u00f3n de archivos locales en los metadatos de un repositorio de Git por medio de la interfaz web."
    }
  ],
  "id": "CVE-2013-4582",
  "lastModified": "2024-11-21T01:55:52.553",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-28T16:15:11.633",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-829"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-4546

Vulnerability from fkie_nvd - Published: 2014-05-13 15:55 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DA23AF5-81E7-4D04-A224-DF823772EC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A780E86-D049-4C46-8481-2E55E974649C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "960E66D9-2E5B-460A-A262-88FF1CE60750",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D61A37D-1A91-4C85-9737-E54670401FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "81CB5B34-09DE-4589-824C-97A6D696BD43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9C5A188-6B92-46A2-9345-386F90BE362C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE14E03-7043-486E-834E-54E39CA3341B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0BCBC68-555F-4295-8E15-A4127702AAB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E82B301E-25BD-4438-9696-DF3E290F32B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B36BD3-69FA-4A22-9377-E86B8E9DFF8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD0A408-7007-4655-A159-12472E4A779E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A46F6D6-411B-428A-ACD4-01707433DA88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2BA4DB-3D3E-4DB2-A35C-52B89D357606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "362C206A-3DF6-40BB-9534-06E19E62D2B9",
              "versionEndIncluding": "1.7.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5468E7D1-96FD-4BCC-B35F-20B8A045CEBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C66C8DB-919E-4D42-A8FB-2F1C08F19EBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "989A3DDF-A7A8-4CA8-844C-12A5A7150866",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9693E73-B622-496C-8427-D8E3F8DA9DD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8F0260-C2EE-4DFB-B368-B55EB4A6FA93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98BB99C5-45C7-4982-A5C7-10319B2FCBCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E186CC7F-1C1F-41CB-88DB-B8DDE36EB7B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46778FDB-4863-451A-88C0-0C38D14C623D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E2DA5C-61BB-4218-8FDA-57AC3C9C0172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C54EB6D2-4AAA-4567-B078-AE91317BF083",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The repository import feature in gitlab-shell before 1.7.4, as used in GitLab, allows remote authenticated users to execute arbitrary commands via the import URL."
    },
    {
      "lang": "es",
      "value": "La funcionalidad de importaci\u00f3n de repositorios en gitlab-shell anterior a 1.7.4, utilizado en GitLab, permite a usuarios remotos autenticados ejecutar comandos arbitrarios a trav\u00e9s de la URL de importaci\u00f3n."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/77.html\n\n\"CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)\"",
  "id": "CVE-2013-4546",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-13T15:55:04.437",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/11/11/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://gitlab.com/gitlab-org/gitlab-shell/blob/master/CHANGELOG"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.gitlab.com/2013/11/08/security-vulnerability-in-gitlab-shell/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/11/11/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://gitlab.com/gitlab-org/gitlab-shell/blob/master/CHANGELOG"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.gitlab.com/2013/11/08/security-vulnerability-in-gitlab-shell/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-4490

Vulnerability from fkie_nvd - Published: 2014-05-13 15:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell before 1.7.3, as used in GitLab 5.0 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DA23AF5-81E7-4D04-A224-DF823772EC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A780E86-D049-4C46-8481-2E55E974649C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "960E66D9-2E5B-460A-A262-88FF1CE60750",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D61A37D-1A91-4C85-9737-E54670401FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "81CB5B34-09DE-4589-824C-97A6D696BD43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9C5A188-6B92-46A2-9345-386F90BE362C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E82B301E-25BD-4438-9696-DF3E290F32B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B36BD3-69FA-4A22-9377-E86B8E9DFF8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD0A408-7007-4655-A159-12472E4A779E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A46F6D6-411B-428A-ACD4-01707433DA88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2BA4DB-3D3E-4DB2-A35C-52B89D357606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3797783-B30D-43D8-AAC6-91DB75ABFAC9",
              "versionEndIncluding": "1.7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5468E7D1-96FD-4BCC-B35F-20B8A045CEBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C66C8DB-919E-4D42-A8FB-2F1C08F19EBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "989A3DDF-A7A8-4CA8-844C-12A5A7150866",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9693E73-B622-496C-8427-D8E3F8DA9DD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8F0260-C2EE-4DFB-B368-B55EB4A6FA93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98BB99C5-45C7-4982-A5C7-10319B2FCBCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E186CC7F-1C1F-41CB-88DB-B8DDE36EB7B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46778FDB-4863-451A-88C0-0C38D14C623D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E2DA5C-61BB-4218-8FDA-57AC3C9C0172",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell before 1.7.3, as used in GitLab 5.0 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key."
    },
    {
      "lang": "es",
      "value": "La funcionalidad de de subida de clave SSH (lib/gitlab_keys.rb) en gitlab-shell anterior a 1.7.3, utilizado en GitLab 5.0 anterior a 5.4.1 y 6.x anterior a 6.2.3, permite a usuarios remotos autenticados ejecutar comandos arbitrarios a trav\u00e9s de metacaracteres de shell en la clave p\u00fablica."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/77.html\n\n\"CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)\"",
  "id": "CVE-2013-4490",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-13T15:55:03.937",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.gitlab.com/2013/11/04/gitlab-ce-6-2-and-5-4-security-release/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.gitlab.com/2013/11/04/gitlab-ce-6-2-and-5-4-security-release/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-4581

Vulnerability from fkie_nvd - Published: 2014-05-12 14:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote attackers to execute arbitrary code via a crafted change using SSH.
Impacted products
Vendor Product Version
gitlab gitlab *
gitlab gitlab 0.8.0
gitlab gitlab 0.9.1
gitlab gitlab 0.9.4
gitlab gitlab 0.9.6
gitlab gitlab 1.0.0
gitlab gitlab 1.0.1
gitlab gitlab 1.0.2
gitlab gitlab 1.1.0
gitlab gitlab 1.2.0
gitlab gitlab 1.2.1
gitlab gitlab 1.2.2
gitlab gitlab 2.0.0
gitlab gitlab 2.1.0
gitlab gitlab 2.2.0
gitlab gitlab 2.3.0
gitlab gitlab 2.3.1
gitlab gitlab 2.4.0
gitlab gitlab 2.5.0
gitlab gitlab 2.6.0
gitlab gitlab 2.7.0
gitlab gitlab 2.8.0
gitlab gitlab 2.8.1
gitlab gitlab 2.9.0
gitlab gitlab 2.9.1
gitlab gitlab 3.0.0
gitlab gitlab 3.0.1
gitlab gitlab 3.0.2
gitlab gitlab 3.0.3
gitlab gitlab 3.1.0
gitlab gitlab 4.0.0
gitlab gitlab 4.1.0
gitlab gitlab 4.2.0
gitlab gitlab 5.0.0
gitlab gitlab 5.0.1
gitlab gitlab 5.1.0
gitlab gitlab 5.2.0
gitlab gitlab 5.3.0
gitlab gitlab 5.4.0
gitlab gitlab 5.4.1
gitlab gitlab 5.4.2
gitlab gitlab 6.0.0
gitlab gitlab 6.1.0
gitlab gitlab 6.2.0
gitlab gitlab 6.2.1
gitlab gitlab 6.2.2
gitlab gitlab *
gitlab gitlab 0.8.0
gitlab gitlab 0.9.1
gitlab gitlab 0.9.4
gitlab gitlab 0.9.6
gitlab gitlab 1.0.0
gitlab gitlab 1.0.1
gitlab gitlab 1.0.2
gitlab gitlab 1.1.0
gitlab gitlab 1.2.0
gitlab gitlab 1.2.1
gitlab gitlab 1.2.2
gitlab gitlab 2.0.0
gitlab gitlab 2.1.0
gitlab gitlab 2.2.0
gitlab gitlab 2.3.0
gitlab gitlab 2.3.1
gitlab gitlab 2.4.0
gitlab gitlab 2.5.0
gitlab gitlab 2.6.0
gitlab gitlab 2.7.0
gitlab gitlab 2.8.0
gitlab gitlab 2.8.1
gitlab gitlab 2.9.0
gitlab gitlab 2.9.1
gitlab gitlab 3.0.0
gitlab gitlab 3.0.1
gitlab gitlab 3.0.2
gitlab gitlab 3.0.3
gitlab gitlab 3.1.0
gitlab gitlab 4.0.0
gitlab gitlab 4.1.0
gitlab gitlab 4.2.0
gitlab gitlab 5.0.0
gitlab gitlab 5.0.1
gitlab gitlab 5.1.0
gitlab gitlab 5.2.0
gitlab gitlab 5.3.0
gitlab gitlab 5.4.0
gitlab gitlab 5.4.1
gitlab gitlab 5.4.2
gitlab gitlab 6.0.0
gitlab gitlab 6.1.0
gitlab gitlab-shell *
gitlab gitlab-shell 1.0.4
gitlab gitlab-shell 1.1.0
gitlab gitlab-shell 1.2.0
gitlab gitlab-shell 1.3.0
gitlab gitlab-shell 1.4.0
gitlab gitlab-shell 1.5.0
gitlab gitlab-shell 1.6.0
gitlab gitlab-shell 1.7.0
gitlab gitlab-shell 1.7.1
gitlab gitlab-shell 1.7.2
gitlab gitlab-shell 1.7.3
gitlab gitlab-shell 1.7.4
gitlab gitlab-shell 1.7.5
gitlab gitlab-shell 1.7.6
gitlab gitlab 5.0.0
gitlab gitlab 5.0.1
gitlab gitlab 5.1.0
gitlab gitlab 5.2.0
gitlab gitlab 5.3.0
gitlab gitlab 5.4.0
gitlab gitlab 5.4.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "B2E382BE-FA4E-4CC8-AC24-DDA7BDE41C8E",
              "versionEndIncluding": "6.2.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:0.8.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "CE0DFA2C-41DA-4E36-8CA9-0C4B8D8C90C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:0.9.1:*:*:*:community:*:*:*",
              "matchCriteriaId": "AC092D59-F723-45C0-AF20-64777AE5684F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:0.9.4:*:*:*:community:*:*:*",
              "matchCriteriaId": "1950E027-EA2C-4904-9195-CBF722B33DDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:0.9.6:*:*:*:community:*:*:*",
              "matchCriteriaId": "86EAAB74-39E2-4C9E-B4F2-BCDFF312CAC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.0.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "C41C6495-EABB-402E-9FE4-CAEE68501445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.0.1:*:*:*:community:*:*:*",
              "matchCriteriaId": "F1101DBF-2066-40C7-9B37-5C8DE7511139",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.0.2:*:*:*:community:*:*:*",
              "matchCriteriaId": "E7BB90B0-C20A-4227-B96C-4508761D3379",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.1.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "84E14E95-80B3-4529-BF3C-13091745AEEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.2.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "DAC793E9-4E50-4F33-AFAB-087ECF86E145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.2.1:*:*:*:community:*:*:*",
              "matchCriteriaId": "3F75A45E-14B1-4422-A855-C6E6AC4B722C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.2.2:*:*:*:community:*:*:*",
              "matchCriteriaId": "94D30489-151E-4B3B-9909-7299DD54F1AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.0.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "355E9233-2B1E-44C8-BA51-E4CB07B37D22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.1.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "BB939572-4A05-4621-AC42-838301DF5129",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.2.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "FE2EEB8B-E46A-495E-B1E7-68647A737F86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.3.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "1D4CCBEB-E02A-4488-827F-D312465BBD62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.3.1:*:*:*:community:*:*:*",
              "matchCriteriaId": "7CDE0745-1E53-41FA-97C3-CDB0C34C26C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.4.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "A085524A-A0BA-4FB7-AF39-A3E5CB4981B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.5.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "DB844D02-E1C4-426C-81A5-6788DE1B55C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.6.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "271BB4F1-DA7A-472F-9BE9-AC84F5A03ADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.7.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "CA3CC2D4-4FFC-4336-8A75-D57FC720AB91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.8.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "05826240-4551-4962-82C0-0202BF94CB80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.8.1:*:*:*:community:*:*:*",
              "matchCriteriaId": "0B66E8D3-A1EB-44CA-8ECB-C30B3E33D479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.9.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "79EB6A9E-C843-467C-8C99-362731631C07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.9.1:*:*:*:community:*:*:*",
              "matchCriteriaId": "17E4F7A7-C306-4E31-857A-6B6377254E7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:3.0.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "879EE5F3-9C51-45DA-947C-DB0800A24959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:3.0.1:*:*:*:community:*:*:*",
              "matchCriteriaId": "5C38D689-3A30-4246-85A6-715C5D3F3B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:3.0.2:*:*:*:community:*:*:*",
              "matchCriteriaId": "F3662FD6-3ED2-4109-916C-C9F971845AAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:3.0.3:*:*:*:community:*:*:*",
              "matchCriteriaId": "1BE9E979-D1D4-45F3-947D-050723CF08E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:3.1.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "59661D3D-6229-4468-8E84-3B626DCC53FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:4.0.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "D05A7568-2C2F-4F75-8195-23D56E834E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:4.1.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "35EE78CC-9CB5-470C-BB32-C2DC73C947B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:4.2.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "6E6ABD26-09D5-449F-ACB1-52B55254BA97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.0.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "C6BC4C79-77B9-44EC-AF94-6E876EA51471",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.0.1:*:*:*:community:*:*:*",
              "matchCriteriaId": "3C2193F3-6CE9-4C34-84E5-083D81F933D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.1.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "D90ACB08-B9D9-4C4F-B8D1-DA9BC1F544FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.2.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "499FDD67-9859-4724-8BB3-DA5B6FEAF4C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.3.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "D8D25320-F483-4845-B901-EC1AD92C9B19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.4.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "6E94F3C6-D4FD-4C9D-B30E-A20DCB56409A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.4.1:*:*:*:community:*:*:*",
              "matchCriteriaId": "A468410B-4ABC-4A4C-A02E-DC30B3DB26C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.4.2:*:*:*:community:*:*:*",
              "matchCriteriaId": "F1325ED2-89B2-4134-8EBD-8D7B989B28BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.0.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "7ED08516-18CD-4638-87E5-7E5823AEDD58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.1.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "E2171EB2-9EA1-4972-B268-C702A68772DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.2.0:*:*:*:community:*:*:*",
              "matchCriteriaId": "FCF4A772-ED0F-43E0-9CE4-9B483F20755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.2.1:*:*:*:community:*:*:*",
              "matchCriteriaId": "65701BE8-9223-45CF-87CD-0CFC5EA34DB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.2.2:*:*:*:community:*:*:*",
              "matchCriteriaId": "AD6656F9-BF5A-4F54-8A77-785BF67BFF79",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "5E462374-C134-446E-9836-E9D7777EA2ED",
              "versionEndIncluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:0.8.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "1436C749-3454-40C5-9D50-4A853A5CB54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:0.9.1:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "991F0C7A-AFF4-4623-8571-322A7B805985",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:0.9.4:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "729924F8-5E0E-4F56-B266-328E0C918AB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:0.9.6:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "3E950DE0-7F8C-4D1C-BFB0-BEF85D8049D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.0.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "3C040C0E-9DE2-4F31-AAAE-502A4A3E48A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.0.1:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "32D736D0-E8EC-4EFF-B798-035DC1B7655C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.0.2:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "DB8CA49D-3F07-4E20-9E45-C82D7012A814",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.1.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "037E5B38-4DB2-456B-BF81-5B15B20B6AF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.2.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "884AC03F-625A-43BF-81BD-E3ACF0E83FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.2.1:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "04144524-638B-41AE-8FA0-3CCAE2B503C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:1.2.2:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "F5347E8C-BF9E-4495-B291-31CEC8BB4BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.0.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "DCB993B5-3A7C-4C7A-B70A-CE41173A98D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.1.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "1065C127-72C5-48F4-876E-1E1F1B60DB2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.2.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "6E994A08-F74C-4F37-900E-493AAA414255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.3.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "D9FABE06-CA7D-4B77-A944-24C165719811",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.3.1:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "217AF163-703B-435E-98DD-BA071FFDD5AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.4.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "8A1FDC7B-126A-49EF-8C7E-03C4D08C4355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.5.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "500AD829-098B-4E6F-955D-1CB024130DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.6.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "BDF97947-68FE-4B2E-A747-6D880DBED590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.7.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "B687AA58-E0A6-48FC-9F17-AACE9235B104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.8.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "B954A9D1-2AB2-43D2-B406-009A57390B0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.8.1:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "4F01FB9C-4706-4939-B094-F41727EF3C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.9.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "F0E8A8DC-38C6-4B30-B5D9-C0D387D2990A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:2.9.1:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "D19921EF-92DF-4828-97DB-9F468A8BC17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:3.0.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "F374EC1C-6BE6-4BD6-88FB-58FCA908EDE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:3.0.1:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "5263CB34-1B3D-42ED-8172-CCCB4D81221C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:3.0.2:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "C2F05FB7-75FE-423B-9535-B901825AA767",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:3.0.3:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "B26074A4-9DB4-4628-98C1-24E096FF8F13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:3.1.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "9F5F8DF2-EDF2-4DF2-BAA0-E0A1D4E99E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:4.0.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "331FB92E-66E1-48F6-9B60-6598692DB899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:4.1.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "E6C230E7-6A64-4D1D-8CAA-613BFA9817B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:4.2.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "E86E2191-6E7E-4F6B-B578-2CBB461A1835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.0.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "77D5DFE4-7AD3-47EB-A53D-78057CBC2B74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.0.1:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "0CE62CA8-6140-4C91-ACE2-4A35D48B4AD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.1.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "D3F1C8DC-895F-4203-92CD-80A512C0B3FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.2.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "1867B5F2-6B02-4CBE-8082-151BC9595A02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.3.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "78E19895-D307-4237-A8C3-2F2DA9253CFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.4.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "999B4B61-3F53-4810-9A2E-6526E479B8BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.4.1:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "602715E3-A0E7-4990-8FD2-6020FB7FA28E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.4.2:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "9BFD668F-303C-490C-AD56-6D780E112039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.0.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "0CB85A2B-4621-473B-AF14-D2C555F2ED58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:6.1.0:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "CAE3803B-C3BF-4B2F-8D3A-94936CB37D07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3523D018-4624-4132-A18E-5309D2FF284A",
              "versionEndIncluding": "1.7.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5468E7D1-96FD-4BCC-B35F-20B8A045CEBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C66C8DB-919E-4D42-A8FB-2F1C08F19EBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "989A3DDF-A7A8-4CA8-844C-12A5A7150866",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9693E73-B622-496C-8427-D8E3F8DA9DD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8F0260-C2EE-4DFB-B368-B55EB4A6FA93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98BB99C5-45C7-4982-A5C7-10319B2FCBCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E186CC7F-1C1F-41CB-88DB-B8DDE36EB7B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46778FDB-4863-451A-88C0-0C38D14C623D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E2DA5C-61BB-4218-8FDA-57AC3C9C0172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C54EB6D2-4AAA-4567-B078-AE91317BF083",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "18CD9D5B-4B87-46D2-A1F8-1F1EFCCA22F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C99B698-ED57-4655-B835-F469403E4E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "605EA4F6-86D7-4460-B88B-E5A8E88CEF4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab-shell:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6A2D71C-8E43-4B0D-9A1B-7B328C245FF9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DA23AF5-81E7-4D04-A224-DF823772EC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A780E86-D049-4C46-8481-2E55E974649C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "960E66D9-2E5B-460A-A262-88FF1CE60750",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D61A37D-1A91-4C85-9737-E54670401FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "81CB5B34-09DE-4589-824C-97A6D696BD43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9C5A188-6B92-46A2-9345-386F90BE362C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gitlab:gitlab:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE14E03-7043-486E-834E-54E39CA3341B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote attackers to execute arbitrary code via a crafted change using SSH."
    },
    {
      "lang": "es",
      "value": "GitLab 5.0 anterior a 5.4.2, Community Edition anterior a 6.2.4, Enterprise Edition anterior a 6.2.1 y gitlab-shell anterior a 1.7.8 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un cambio manipulado que utiliza SSH."
    }
  ],
  "id": "CVE-2013-4581",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-12T14:55:05.290",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2013-4582 (GCVE-0-2013-4582)

Vulnerability from cvelistv5 – Published: 2020-01-28 15:17 – Updated: 2024-08-06 16:45
VLAI?
Summary
The (1) create_branch, (2) create_tag, (3) import_project, and (4) fork_project functions in lib/gitlab_projects.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to include information from local files into the metadata of a Git repository via the web interface.
Severity ?
No CVSS data available.
CWE
  • Path Disclosure
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:15.169Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GitLab",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "5.0 before 5.4.2"
            }
          ]
        },
        {
          "product": "GitLab Community Edition",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "before 6.2.4"
            }
          ]
        },
        {
          "product": "GitLab Enterprise Edition",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "before 6.2.1"
            }
          ]
        },
        {
          "product": "gitlab-shell",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "before 1.7.8"
            }
          ]
        }
      ],
      "datePublic": "2013-11-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The (1) create_branch, (2) create_tag, (3) import_project, and (4) fork_project functions in lib/gitlab_projects.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to include information from local files into the metadata of a Git repository via the web interface."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Path Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-28T15:17:23",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4582",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GitLab",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.0 before 5.4.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "GitLab Community Edition",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 6.2.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "GitLab Enterprise Edition",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 6.2.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "gitlab-shell",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 1.7.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GitLab"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The (1) create_branch, (2) create_tag, (3) import_project, and (4) fork_project functions in lib/gitlab_projects.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to include information from local files into the metadata of a Git repository via the web interface."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Path Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.openwall.com/lists/oss-security/2013/11/15/4",
              "refsource": "MISC",
              "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
            },
            {
              "name": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/",
              "refsource": "MISC",
              "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
            },
            {
              "name": "https://www.openwall.com/lists/oss-security/2013/11/18/4",
              "refsource": "MISC",
              "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4582",
    "datePublished": "2020-01-28T15:17:23",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:15.169Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4583 (GCVE-0-2013-4583)

Vulnerability from cvelistv5 – Published: 2020-01-28 15:11 – Updated: 2024-08-06 16:45
VLAI?
Summary
The parse_cmd function in lib/gitlab_shell.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to gain privileges and clone arbitrary repositories.
Severity ?
No CVSS data available.
CWE
  • Directory Traversal (Local File Inclusion)
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.926Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GitLab",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "5.0 before 5.4.2"
            }
          ]
        },
        {
          "product": "GitLab Community Edition",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "before 6.2.4"
            }
          ]
        },
        {
          "product": "GitLab Enterprise Edition",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "before 6.2.1"
            }
          ]
        },
        {
          "product": "gitlab-shell",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "before 1.7.8"
            }
          ]
        }
      ],
      "datePublic": "2013-11-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The parse_cmd function in lib/gitlab_shell.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to gain privileges and clone arbitrary repositories."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Directory Traversal (Local File Inclusion)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-28T15:11:45",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4583",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GitLab",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.0 before 5.4.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "GitLab Community Edition",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 6.2.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "GitLab Enterprise Edition",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 6.2.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "gitlab-shell",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 1.7.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GitLab"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The parse_cmd function in lib/gitlab_shell.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to gain privileges and clone arbitrary repositories."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Directory Traversal (Local File Inclusion)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.openwall.com/lists/oss-security/2013/11/15/4",
              "refsource": "MISC",
              "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
            },
            {
              "name": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/",
              "refsource": "MISC",
              "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
            },
            {
              "name": "https://www.openwall.com/lists/oss-security/2013/11/18/4",
              "refsource": "MISC",
              "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4583",
    "datePublished": "2020-01-28T15:11:45",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.926Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4490 (GCVE-0-2013-4490)

Vulnerability from cvelistv5 – Published: 2014-05-13 15:00 – Updated: 2024-08-06 16:45
VLAI?
Summary
The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell before 1.7.3, as used in GitLab 5.0 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.763Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gitlab.com/2013/11/04/gitlab-ce-6-2-and-5-4-security-release/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell before 1.7.3, as used in GitLab 5.0 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-13T14:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gitlab.com/2013/11/04/gitlab-ce-6-2-and-5-4-security-release/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4490",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell before 1.7.3, as used in GitLab 5.0 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.gitlab.com/2013/11/04/gitlab-ce-6-2-and-5-4-security-release/",
              "refsource": "CONFIRM",
              "url": "https://www.gitlab.com/2013/11/04/gitlab-ce-6-2-and-5-4-security-release/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4490",
    "datePublished": "2014-05-13T15:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.763Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4546 (GCVE-0-2013-4546)

Vulnerability from cvelistv5 – Published: 2014-05-13 15:00 – Updated: 2024-08-06 16:45
VLAI?
Summary
The repository import feature in gitlab-shell before 1.7.4, as used in GitLab, allows remote authenticated users to execute arbitrary commands via the import URL.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:15.033Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gitlab.com/2013/11/08/security-vulnerability-in-gitlab-shell/"
          },
          {
            "name": "[oss-security] 20131111 Security vulnerability in gitlab-shell (CVE-2013-4546)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/11/11/2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gitlab-org/gitlab-shell/blob/master/CHANGELOG"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The repository import feature in gitlab-shell before 1.7.4, as used in GitLab, allows remote authenticated users to execute arbitrary commands via the import URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-13T14:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gitlab.com/2013/11/08/security-vulnerability-in-gitlab-shell/"
        },
        {
          "name": "[oss-security] 20131111 Security vulnerability in gitlab-shell (CVE-2013-4546)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/11/11/2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://gitlab.com/gitlab-org/gitlab-shell/blob/master/CHANGELOG"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4546",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The repository import feature in gitlab-shell before 1.7.4, as used in GitLab, allows remote authenticated users to execute arbitrary commands via the import URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.gitlab.com/2013/11/08/security-vulnerability-in-gitlab-shell/",
              "refsource": "CONFIRM",
              "url": "https://www.gitlab.com/2013/11/08/security-vulnerability-in-gitlab-shell/"
            },
            {
              "name": "[oss-security] 20131111 Security vulnerability in gitlab-shell (CVE-2013-4546)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/11/11/2"
            },
            {
              "name": "https://gitlab.com/gitlab-org/gitlab-shell/blob/master/CHANGELOG",
              "refsource": "CONFIRM",
              "url": "https://gitlab.com/gitlab-org/gitlab-shell/blob/master/CHANGELOG"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4546",
    "datePublished": "2014-05-13T15:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:15.033Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4581 (GCVE-0-2013-4581)

Vulnerability from cvelistv5 – Published: 2014-05-12 14:00 – Updated: 2024-08-06 16:45
VLAI?
Summary
GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote attackers to execute arbitrary code via a crafted change using SSH.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.854Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20131114 Re: Requesting four (4) CVE identifiers for GitLab",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote attackers to execute arbitrary code via a crafted change using SSH."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-12T13:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20131114 Re: Requesting four (4) CVE identifiers for GitLab",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4581",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote attackers to execute arbitrary code via a crafted change using SSH."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20131114 Re: Requesting four (4) CVE identifiers for GitLab",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
            },
            {
              "name": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/",
              "refsource": "CONFIRM",
              "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4581",
    "datePublished": "2014-05-12T14:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.854Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4582 (GCVE-0-2013-4582)

Vulnerability from nvd – Published: 2020-01-28 15:17 – Updated: 2024-08-06 16:45
VLAI?
Summary
The (1) create_branch, (2) create_tag, (3) import_project, and (4) fork_project functions in lib/gitlab_projects.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to include information from local files into the metadata of a Git repository via the web interface.
Severity ?
No CVSS data available.
CWE
  • Path Disclosure
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:15.169Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GitLab",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "5.0 before 5.4.2"
            }
          ]
        },
        {
          "product": "GitLab Community Edition",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "before 6.2.4"
            }
          ]
        },
        {
          "product": "GitLab Enterprise Edition",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "before 6.2.1"
            }
          ]
        },
        {
          "product": "gitlab-shell",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "before 1.7.8"
            }
          ]
        }
      ],
      "datePublic": "2013-11-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The (1) create_branch, (2) create_tag, (3) import_project, and (4) fork_project functions in lib/gitlab_projects.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to include information from local files into the metadata of a Git repository via the web interface."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Path Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-28T15:17:23",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4582",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GitLab",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.0 before 5.4.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "GitLab Community Edition",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 6.2.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "GitLab Enterprise Edition",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 6.2.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "gitlab-shell",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 1.7.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GitLab"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The (1) create_branch, (2) create_tag, (3) import_project, and (4) fork_project functions in lib/gitlab_projects.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to include information from local files into the metadata of a Git repository via the web interface."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Path Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.openwall.com/lists/oss-security/2013/11/15/4",
              "refsource": "MISC",
              "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
            },
            {
              "name": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/",
              "refsource": "MISC",
              "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
            },
            {
              "name": "https://www.openwall.com/lists/oss-security/2013/11/18/4",
              "refsource": "MISC",
              "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4582",
    "datePublished": "2020-01-28T15:17:23",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:15.169Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4583 (GCVE-0-2013-4583)

Vulnerability from nvd – Published: 2020-01-28 15:11 – Updated: 2024-08-06 16:45
VLAI?
Summary
The parse_cmd function in lib/gitlab_shell.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to gain privileges and clone arbitrary repositories.
Severity ?
No CVSS data available.
CWE
  • Directory Traversal (Local File Inclusion)
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.926Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GitLab",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "5.0 before 5.4.2"
            }
          ]
        },
        {
          "product": "GitLab Community Edition",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "before 6.2.4"
            }
          ]
        },
        {
          "product": "GitLab Enterprise Edition",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "before 6.2.1"
            }
          ]
        },
        {
          "product": "gitlab-shell",
          "vendor": "GitLab",
          "versions": [
            {
              "status": "affected",
              "version": "before 1.7.8"
            }
          ]
        }
      ],
      "datePublic": "2013-11-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The parse_cmd function in lib/gitlab_shell.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to gain privileges and clone arbitrary repositories."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Directory Traversal (Local File Inclusion)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-28T15:11:45",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4583",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GitLab",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.0 before 5.4.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "GitLab Community Edition",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 6.2.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "GitLab Enterprise Edition",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 6.2.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "gitlab-shell",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 1.7.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GitLab"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The parse_cmd function in lib/gitlab_shell.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to gain privileges and clone arbitrary repositories."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Directory Traversal (Local File Inclusion)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.openwall.com/lists/oss-security/2013/11/15/4",
              "refsource": "MISC",
              "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
            },
            {
              "name": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/",
              "refsource": "MISC",
              "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
            },
            {
              "name": "https://www.openwall.com/lists/oss-security/2013/11/18/4",
              "refsource": "MISC",
              "url": "https://www.openwall.com/lists/oss-security/2013/11/18/4"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4583",
    "datePublished": "2020-01-28T15:11:45",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.926Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4490 (GCVE-0-2013-4490)

Vulnerability from nvd – Published: 2014-05-13 15:00 – Updated: 2024-08-06 16:45
VLAI?
Summary
The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell before 1.7.3, as used in GitLab 5.0 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.763Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gitlab.com/2013/11/04/gitlab-ce-6-2-and-5-4-security-release/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell before 1.7.3, as used in GitLab 5.0 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-13T14:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gitlab.com/2013/11/04/gitlab-ce-6-2-and-5-4-security-release/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4490",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell before 1.7.3, as used in GitLab 5.0 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.gitlab.com/2013/11/04/gitlab-ce-6-2-and-5-4-security-release/",
              "refsource": "CONFIRM",
              "url": "https://www.gitlab.com/2013/11/04/gitlab-ce-6-2-and-5-4-security-release/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4490",
    "datePublished": "2014-05-13T15:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.763Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4546 (GCVE-0-2013-4546)

Vulnerability from nvd – Published: 2014-05-13 15:00 – Updated: 2024-08-06 16:45
VLAI?
Summary
The repository import feature in gitlab-shell before 1.7.4, as used in GitLab, allows remote authenticated users to execute arbitrary commands via the import URL.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:15.033Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gitlab.com/2013/11/08/security-vulnerability-in-gitlab-shell/"
          },
          {
            "name": "[oss-security] 20131111 Security vulnerability in gitlab-shell (CVE-2013-4546)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/11/11/2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gitlab-org/gitlab-shell/blob/master/CHANGELOG"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The repository import feature in gitlab-shell before 1.7.4, as used in GitLab, allows remote authenticated users to execute arbitrary commands via the import URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-13T14:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gitlab.com/2013/11/08/security-vulnerability-in-gitlab-shell/"
        },
        {
          "name": "[oss-security] 20131111 Security vulnerability in gitlab-shell (CVE-2013-4546)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/11/11/2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://gitlab.com/gitlab-org/gitlab-shell/blob/master/CHANGELOG"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4546",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The repository import feature in gitlab-shell before 1.7.4, as used in GitLab, allows remote authenticated users to execute arbitrary commands via the import URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.gitlab.com/2013/11/08/security-vulnerability-in-gitlab-shell/",
              "refsource": "CONFIRM",
              "url": "https://www.gitlab.com/2013/11/08/security-vulnerability-in-gitlab-shell/"
            },
            {
              "name": "[oss-security] 20131111 Security vulnerability in gitlab-shell (CVE-2013-4546)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/11/11/2"
            },
            {
              "name": "https://gitlab.com/gitlab-org/gitlab-shell/blob/master/CHANGELOG",
              "refsource": "CONFIRM",
              "url": "https://gitlab.com/gitlab-org/gitlab-shell/blob/master/CHANGELOG"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4546",
    "datePublished": "2014-05-13T15:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:15.033Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4581 (GCVE-0-2013-4581)

Vulnerability from nvd – Published: 2014-05-12 14:00 – Updated: 2024-08-06 16:45
VLAI?
Summary
GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote attackers to execute arbitrary code via a crafted change using SSH.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.854Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20131114 Re: Requesting four (4) CVE identifiers for GitLab",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote attackers to execute arbitrary code via a crafted change using SSH."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-12T13:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20131114 Re: Requesting four (4) CVE identifiers for GitLab",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4581",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote attackers to execute arbitrary code via a crafted change using SSH."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20131114 Re: Requesting four (4) CVE identifiers for GitLab",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/11/15/4"
            },
            {
              "name": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/",
              "refsource": "CONFIRM",
              "url": "https://www.gitlab.com/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4581",
    "datePublished": "2014-05-12T14:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.854Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}