5.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
42.0%
gitLab is vulnerable to a directory traversal. The vulnerability occurs because GitLab does not properly validate the URL of a webhook. An attacker can exploit this vulnerability by creating a malicious webhook with a URL that contains a crafted directory traversal sequence. This will cause GitLab to access the file system outside of the intended directory structure, which could allow the attacker to steal sensitive files or execute arbitrary code.
CPE | Name | Operator | Version |
---|---|---|---|
gitlab:sid | eq | 13.4.7-2 | |
gitlab:sid | eq | 13.3.9-1 | |
gitlab:sid | eq | 13.4.7-2 | |
gitlab:sid | eq | 13.3.9-1 |