FreeBSD : Gitlab -- Multiple Vulnerabilities (33557582-3958-11ec-90ba-001b217b3468)

medium Nessus Plugin ID 154774



The remote FreeBSD host is missing one or more security-related updates.


Gitlab reports :

Stored XSS via ipynb files

Pipeline schedules on imported projects can be set to automatically active after import

Potential Denial of service via Workhorse

Improper Access Control allows Merge Request creator to bypass locked status

Projects API discloses ID and name of private groups

Severity of an incident can be changed by a guest user

System root password accidentally written to log file

Potential DoS via a malformed TIFF image

Bypass of CODEOWNERS Merge Request approval requirement

Change project visibility to a restricted option

Project exports leak external webhook token value

SCIM token is visible after creation

Invited group members, with access inherited from parent group, continue to have project access even after invited subgroup is transfered

Regular expression denial of service issue when cleaning namespace path

Prevent creation of scopeless apps using applications API

Webhook data exposes assignee's private email address


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 154774

File Name: freebsd_pkg_33557582395811ec90ba001b217b3468.nasl

Version: 1.5

Type: local

Published: 11/1/2021

Updated: 11/27/2023

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-39913


Risk Factor: Medium

Base Score: 6.7

Temporal Score: 6

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:gitlab-ce, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/30/2021

Vulnerability Publication Date: 10/28/2021

Reference Information

CVE: CVE-2021-39895, CVE-2021-39897, CVE-2021-39898, CVE-2021-39901, CVE-2021-39902, CVE-2021-39903, CVE-2021-39904, CVE-2021-39905, CVE-2021-39906, CVE-2021-39907, CVE-2021-39909, CVE-2021-39911, CVE-2021-39912, CVE-2021-39913, CVE-2021-39914

IAVA: 2021-A-0523-S