Lucene search

K
attackerkbAttackerKBAKB:C9B4BB36-5160-45C7-B6D7-DD13245D233F
HistoryApr 08, 2020 - 12:00 a.m.

CVE-2020-10977

2020-04-0800:00:00
attackerkb.com
7

0.002 Low

EPSS

Percentile

52.1%

GitLab EE/CE 8.5 to 12.9 is vulnerable to a an path traversal when moving an issue between projects.

Recent assessments:

wvu-r7 at June 09, 2020 10:49pm UTC reported:

@zeroSteiner pointed us to this exploit chain today: <https://twitter.com/CasvCooten/status/1270374273849401346&gt;. It uses CVE-2020-10535 to satisfy the authentication requirement. Note that <https://hackerone.com/reports/827052&gt; already explains the path to RCE. We actually already have a Rails secret deserialization exploit, so β€œweaponizing” the exploit chain is possible.@adfoster-r7 has pointed out that GitLab requires a signed cookie, so this module will not work.

ericalexanderorg at May 15, 2020 6:13pm UTC reported:

@zeroSteiner pointed us to this exploit chain today: <https://twitter.com/CasvCooten/status/1270374273849401346&gt;. It uses CVE-2020-10535 to satisfy the authentication requirement. Note that <https://hackerone.com/reports/827052&gt; already explains the path to RCE. We actually already have a Rails secret deserialization exploit, so β€œweaponizing” the exploit chain is possible.@adfoster-r7 has pointed out that GitLab requires a signed cookie, so this module will not work.

Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 4

0.002 Low

EPSS

Percentile

52.1%