Gitlab reports :
Vendor Cross-Account Assume-Role Attack
Stored XSS on the Vulnerability Page
Outdated Job Token Can Be Reused to Access Unauthorized Resources
File Disclosure Via Workhorse File Upload Bypass
Unauthorized Maintainer Can Edit Group Badge
Denial of Service Within Wiki Functionality
Sign-in Vulnerable to Brute-force Attacks
Invalidated Session Allows Account Access With an Old Password
GitLab Omniauth Endpoint Renders User Controlled Messages
Blind SSRF Through Repository Mirroring
Information Disclosure Through Incorrect Group Permission Verifications
No Rate Limit on GitLab Webhook Feature
GitLab Session Revocation Feature Does Not Invalidate All Sessions
OAuth Authorization Scope for an External Application Can Be Changed Without User Consent
Unauthorized Maintainer Can Delete Repository
Improper Verification of Deploy-Key Leads to Access Restricted Repository
Disabled Repository Still Accessible With a Deploy-Token
Duplicated Secret Code Generated by 2 Factor Authentication Mechanism
Lack of Validation Within Project Invitation Flow
Current Sessions Not Invalidated Upon Enabling 2 Factor Authentication
Users Without 2 Factor Authentication Can Be Blocked Accessing GitLab
Lack of Upper Bound Check Leading to Possible Denial of Service
2 Factor Authentication for Groups Was Not Enforced Within API Endpoint
GitLab Runner Denial of Service via CI Jobs
Update jQuery Dependency
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from the FreeBSD VuXML database :
#
# Copyright 2003-2021 Jacques Vidrine and contributors
#
# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
# HTML, PDF, PostScript, RTF and so forth) with or without modification,
# are permitted provided that the following conditions are met:
# 1. Redistributions of source code (VuXML) must retain the above
# copyright notice, this list of conditions and the following
# disclaimer as the first lines of this file unmodified.
# 2. Redistributions in compiled form (transformed to other DTDs,
# published online in any format, converted to PDF, PostScript,
# RTF and other formats) must reproduce the above copyright
# notice, this list of conditions and the following disclaimer
# in the documentation and/or other materials provided with the
# distribution.
#
# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#
include('compat.inc');
if (description)
{
script_id(140234);
script_version("1.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/12/06");
script_cve_id(
"CVE-2020-11022",
"CVE-2020-13284",
"CVE-2020-13287",
"CVE-2020-13289",
"CVE-2020-13297",
"CVE-2020-13298",
"CVE-2020-13299",
"CVE-2020-13300",
"CVE-2020-13301",
"CVE-2020-13302",
"CVE-2020-13303",
"CVE-2020-13304",
"CVE-2020-13305",
"CVE-2020-13306",
"CVE-2020-13307",
"CVE-2020-13308",
"CVE-2020-13309",
"CVE-2020-13310",
"CVE-2020-13311",
"CVE-2020-13313",
"CVE-2020-13314",
"CVE-2020-13315",
"CVE-2020-13316",
"CVE-2020-13317",
"CVE-2020-13318"
);
script_xref(name:"CEA-ID", value:"CEA-2021-0025");
script_xref(name:"CEA-ID", value:"CEA-2021-0004");
script_name(english:"FreeBSD : Gitlab -- multiple vulnerabilities (1fb13175-ed52-11ea-8b93-001b217b3468)");
script_set_attribute(attribute:"synopsis", value:
"The remote FreeBSD host is missing one or more security-related
updates.");
script_set_attribute(attribute:"description", value:
"Gitlab reports :
Vendor Cross-Account Assume-Role Attack
Stored XSS on the Vulnerability Page
Outdated Job Token Can Be Reused to Access Unauthorized Resources
File Disclosure Via Workhorse File Upload Bypass
Unauthorized Maintainer Can Edit Group Badge
Denial of Service Within Wiki Functionality
Sign-in Vulnerable to Brute-force Attacks
Invalidated Session Allows Account Access With an Old Password
GitLab Omniauth Endpoint Renders User Controlled Messages
Blind SSRF Through Repository Mirroring
Information Disclosure Through Incorrect Group Permission
Verifications
No Rate Limit on GitLab Webhook Feature
GitLab Session Revocation Feature Does Not Invalidate All Sessions
OAuth Authorization Scope for an External Application Can Be Changed
Without User Consent
Unauthorized Maintainer Can Delete Repository
Improper Verification of Deploy-Key Leads to Access Restricted
Repository
Disabled Repository Still Accessible With a Deploy-Token
Duplicated Secret Code Generated by 2 Factor Authentication Mechanism
Lack of Validation Within Project Invitation Flow
Current Sessions Not Invalidated Upon Enabling 2 Factor Authentication
Users Without 2 Factor Authentication Can Be Blocked Accessing GitLab
Lack of Upper Bound Check Leading to Possible Denial of Service
2 Factor Authentication for Groups Was Not Enforced Within API
Endpoint
GitLab Runner Denial of Service via CI Jobs
Update jQuery Dependency");
# https://about.gitlab.com/releases/2020/09/02/security-release-gitlab-13-3-3-released/
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?93c2386d");
# https://vuxml.freebsd.org/freebsd/1fb13175-ed52-11ea-8b93-001b217b3468.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2764b73c");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-13309");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2020-13300");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/09/02");
script_set_attribute(attribute:"patch_publication_date", value:"2020/09/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/09/04");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:gitlab-ce");
script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"FreeBSD Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
exit(0);
}
include("audit.inc");
include("freebsd_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (pkg_test(save_report:TRUE, pkg:"gitlab-ce>=13.3.0<13.3.4")) flag++;
if (pkg_test(save_report:TRUE, pkg:"gitlab-ce>=13.2.0<13.2.8")) flag++;
if (pkg_test(save_report:TRUE, pkg:"gitlab-ce>=0<13.1.10")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13284
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13287
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13289
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13297
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13298
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13299
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13300
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13301
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13302
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13303
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13304
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13305
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13306
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13307
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13308
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13309
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13310
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13311
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13313
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13314
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13315
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13316
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13317
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13318
www.nessus.org/u?2764b73c
www.nessus.org/u?93c2386d