Command Injection vulnerability in gitlabhook. Unvalidated POST request body input is concatenated to an exec call, enabling execution of arbitrary commands
Reporter | Title | Published | Views | Family All 12 |
---|---|---|---|---|
![]() | CVE-2019-5485 | 13 Sep 201917:30 | – | cvelist |
![]() | GHSA-549F-73HH-MJ38 Command Injection in gitlabhook | 16 Sep 201922:24 | – | osv |
![]() | CVE-2019-5485 | 13 Sep 201918:15 | – | cve |
![]() | CVE-2019-5485 | 13 Sep 201918:15 | – | nvd |
![]() | NPMJS gitlabhook 0.0.17 - (repository) Remote Command Execution Exploit | 26 Sep 201900:00 | – | zdt |
![]() | Command Injection | 17 Sep 201920:56 | – | nodejs |
![]() | OS Command Injection | 16 Sep 201901:31 | – | veracode |
![]() | NPMJS gitlabhook 0.0.17 - repository Remote Command Execution | 25 Sep 201900:00 | – | exploitpack |
![]() | Command injection | 13 Sep 201918:15 | – | prion |
![]() | NPMJS gitlabhook 0.0.17 Remote Command Execution | 25 Sep 201900:00 | – | packetstorm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo