FreeBSD : Gitlab -- multiple vulnerabilities (1fb13175-ed52-11ea-8b93-001b217b3468)

critical Nessus Plugin ID 140234



The remote FreeBSD host is missing one or more security-related updates.


Gitlab reports :

Vendor Cross-Account Assume-Role Attack

Stored XSS on the Vulnerability Page

Outdated Job Token Can Be Reused to Access Unauthorized Resources

File Disclosure Via Workhorse File Upload Bypass

Unauthorized Maintainer Can Edit Group Badge

Denial of Service Within Wiki Functionality

Vulnerable to Brute-force Attacks

Invalidated Session Allows Account Access With an Old Password

GitLab Omniauth Endpoint Renders User Controlled Messages

Blind SSRF Through Repository Mirroring

Information Disclosure Through Incorrect Group Permission Verifications

No Rate Limit on GitLab Webhook Feature

GitLab Session Revocation Feature Does Not Invalidate All Sessions

OAuth Authorization Scope for an External Application Can Be Changed Without User Consent

Unauthorized Maintainer Can Delete Repository

Improper Verification of Deploy-Key Leads to Access Restricted Repository

Disabled Repository Still Accessible With a Deploy-Token

Duplicated Secret Code Generated by 2 Factor Authentication Mechanism

Lack of Validation Within Project Invitation Flow

Current Sessions Not Invalidated Upon Enabling 2 Factor Authentication

Users Without 2 Factor Authentication Can Be Blocked Accessing GitLab

Lack of Upper Bound Check Leading to Possible Denial of Service

2 Factor Authentication for Groups Was Not Enforced Within API Endpoint

GitLab Runner Denial of Service via CI Jobs

Update jQuery Dependency


Update the affected packages.

See Also

Plugin Details

Severity: Critical

ID: 140234

File Name: freebsd_pkg_1fb13175ed5211ea8b93001b217b3468.nasl

Version: 1.7

Type: local

Published: 9/4/2020

Updated: 12/6/2022

Supported Sensors: Nessus

Risk Information


Risk Factor: High

Score: 7.1


Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2020-13309


Risk Factor: Critical

Base Score: 10

Temporal Score: 9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2020-13300

Vulnerability Information

CPE: cpe:/o:freebsd:freebsd, p-cpe:/a:freebsd:freebsd:gitlab-ce

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/2/2020

Vulnerability Publication Date: 9/2/2020

Reference Information

CVE: CVE-2020-11022, CVE-2020-13284, CVE-2020-13287, CVE-2020-13289, CVE-2020-13297, CVE-2020-13298, CVE-2020-13299, CVE-2020-13300, CVE-2020-13301, CVE-2020-13302, CVE-2020-13303, CVE-2020-13304, CVE-2020-13305, CVE-2020-13306, CVE-2020-13307, CVE-2020-13308, CVE-2020-13309, CVE-2020-13310, CVE-2020-13311, CVE-2020-13313, CVE-2020-13314, CVE-2020-13315, CVE-2020-13316, CVE-2020-13317, CVE-2020-13318