Description
GitLab Community and Enterprise Edition before 10.7.7, 10.8.x before 10.8.6, and 11.x before 11.0.4 allows Directory Traversal with write access and resultant remote code execution via the GitLab projects import component.
CVSS Metrics
- Vector
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- network
- Complexity
- low
- Privileges
- none
- User Action
- none
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- CWE-22
Metadata
- Primary Vendor
- GITLAB
- Published
- 7/18/2018
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
gitlab : gitlabgitlab : gitlabgitlab : gitlabgitlab : gitlabgitlab : gitlabgitlab : gitlab
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.