This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
{"id": "CVE-2018-17454", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2018-17454", "description": "This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", "published": "2022-02-25T07:44:38", "modified": "2022-02-25T07:44:38", "cvss": {}, "cvss2": {}, "cvss3": {}, "href": "", "reporter": "candidate", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2022-02-25T07:44:38", "viewCount": 11, "enchantments": {"backreferences": {"references": [{"type": "debiancve", "idList": ["DEBIANCVE:CVE-2018-17454"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-17454"]}]}, "score": {"value": 1.5, "vector": "NONE"}, "dependencies": {"references": [{"type": "debiancve", "idList": ["DEBIANCVE:CVE-2018-17454"]}, {"type": "freebsd", "idList": ["065B3B72-C5AB-11E8-9AE2-001B217B3468"]}, {"type": "nessus", "idList": ["FREEBSD_PKG_065B3B72C5AB11E89AE2001B217B3468.NASL"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-17454"]}], "rev": 4}, "vulnersScore": 1.5}, "_state": {"dependencies": 1659901773, "score": 1659855189, "epss": 1679179052}, "_internal": {"score_hash": "d2c6712c2b9ab403607673feded4cf7c"}, "cpe": [], "cpe23": [], "cwe": [], "affectedSoftware": [], "affectedConfiguration": [], "cpeConfiguration": {}, "extraReferences": [], "product_info": []}
{"ubuntucve": [{"lastseen": "2022-08-04T13:46:01", "description": "Persistent XSS on issue details. The issue details page contained a\nlack of input validation and output encoding issue which resulted in a\npersistent XSS.", "cvss3": {}, "published": "2018-10-02T00:00:00", "type": "ubuntucve", "title": "CVE-2018-17454", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2018-17454"], "modified": "2018-10-02T00:00:00", "id": "UB:CVE-2018-17454", "href": "https://ubuntu.com/security/CVE-2018-17454", "cvss": {"score": 0.0, "vector": "NONE"}}], "debiancve": [{"lastseen": "2022-02-25T11:33:18", "description": "Persistent XSS on issue details", "cvss3": {}, "published": "2022-02-25T07:44:38", "type": "debiancve", "title": "CVE-2018-17454", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2018-17454"], "modified": "2022-02-25T07:44:38", "id": "DEBIANCVE:CVE-2018-17454", "href": "https://security-tracker.debian.org/tracker/CVE-2018-17454", "cvss": {"score": 0.0, "vector": "NONE"}}], "nessus": [{"lastseen": "2021-10-16T00:50:01", "description": "Gitlab reports :\n\nSSRF GCP access token disclosure\n\nPersistent XSS on issue details\n\nDiff formatter DoS in Sidekiq jobs\n\nConfidential information disclosure in events API endpoint\n\nvalidate_localhost function in url_blocker.rb could be bypassed\n\nSlack integration CSRF Oauth2\n\nGRPC::Unknown logging token disclosure\n\nIDOR merge request approvals\n\nPersistent XSS package.json\n\nPersistent XSS merge request project import", "cvss3": {}, "published": "2018-10-02T00:00:00", "type": "nessus", "title": "FreeBSD : Gitlab -- multiple vulnerabilities (065b3b72-c5ab-11e8-9ae2-001b217b3468)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-15472", "CVE-2018-17449", "CVE-2018-17450", "CVE-2018-17451", "CVE-2018-17452", "CVE-2018-17453", "CVE-2018-17454", "CVE-2018-17455", "CVE-2018-17536", "CVE-2018-17537"], "modified": "2018-11-10T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:gitlab-ce", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_065B3B72C5AB11E89AE2001B217B3468.NASL", "href": "https://www.tenable.com/plugins/nessus/117863", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(117863);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2018/11/10 11:49:46\");\n\n script_cve_id(\"CVE-2018-15472\", \"CVE-2018-17449\", \"CVE-2018-17450\", \"CVE-2018-17451\", \"CVE-2018-17452\", \"CVE-2018-17453\", \"CVE-2018-17454\", \"CVE-2018-17455\", \"CVE-2018-17536\", \"CVE-2018-17537\");\n\n script_name(english:\"FreeBSD : Gitlab -- multiple vulnerabilities (065b3b72-c5ab-11e8-9ae2-001b217b3468)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Gitlab reports :\n\nSSRF GCP access token disclosure\n\nPersistent XSS on issue details\n\nDiff formatter DoS in Sidekiq jobs\n\nConfidential information disclosure in events API endpoint\n\nvalidate_localhost function in url_blocker.rb could be bypassed\n\nSlack integration CSRF Oauth2\n\nGRPC::Unknown logging token disclosure\n\nIDOR merge request approvals\n\nPersistent XSS package.json\n\nPersistent XSS merge request project import\"\n );\n # https://about.gitlab.com/2018/10/01/security-release-gitlab-11-dot-3-dot-1-released/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f5636338\"\n );\n # https://vuxml.freebsd.org/freebsd/065b3b72-c5ab-11e8-9ae2-001b217b3468.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6d19410b\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:gitlab-ce\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/10/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/10/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/10/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"gitlab-ce>=11.3.0<11.3.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"gitlab-ce>=11.2.0<11.2.4\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"gitlab-ce>=7.6.0<11.1.7\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "freebsd": [{"lastseen": "2022-01-19T15:51:31", "description": "\n\nGitlab reports:\n\nSSRF GCP access token disclosure\nPersistent XSS on issue details\nDiff formatter DoS in Sidekiq jobs\nConfidential information disclosure in events API endpoint\nvalidate_localhost function in url_blocker.rb could be bypassed\nSlack integration CSRF Oauth2\nGRPC::Unknown logging token disclosure\nIDOR merge request approvals\nPersistent XSS package.json\nPersistent XSS merge request project import\n\n\n", "cvss3": {}, "published": "2018-10-01T00:00:00", "type": "freebsd", "title": "Gitlab -- multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2018-15472", "CVE-2018-17449", "CVE-2018-17450", "CVE-2018-17451", "CVE-2018-17452", "CVE-2018-17453", "CVE-2018-17454", "CVE-2018-17455", "CVE-2018-17536", "CVE-2018-17537"], "modified": "2018-10-01T00:00:00", "id": "065B3B72-C5AB-11E8-9AE2-001B217B3468", "href": "https://vuxml.freebsd.org/freebsd/065b3b72-c5ab-11e8-9ae2-001b217b3468.html", "cvss": {"score": 0.0, "vector": "NONE"}}]}