FreeBSD : Gitlab -- Multiple vulnerabilities (16f7ec68-5cce-11ed-9be7-454b1dd82c64)

critical Nessus Plugin ID 167044

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 16f7ec68-5cce-11ed-9be7-454b1dd82c64 advisory.

- Gitlab reports: DAST analyzer sends custom request headers with every request Stored-XSS with CSP-bypass via scoped labels' color Maintainer can leak Datadog API key by changing integration URL Uncontrolled resource consumption when parsing URLs Issue HTTP requests when users view an OpenAPI document and click buttons Command injection in CI jobs via branch name in CI pipelines Open redirection Prefill variables do not check permission of the project in external CI config Disclosure of audit events to insufficiently permissioned group and project members Arbitrary GFM references rendered in Jira issue description leak private/confidential resources Award emojis API for an internal note is accessible to users without access to the note Open redirect in pipeline artifacts when generating HTML documents Retrying a job in a downstream pipeline allows the retrying user to take ownership of the retried jobs in upstream pipelines Project-level Secure Files can be written out of the target directory (CVE-2022-2251, CVE-2022-2761, CVE-2022-3265, CVE-2022-3280, CVE-2022-3413, CVE-2022-3483, CVE-2022-3486, CVE-2022-3706, CVE-2022-3726, CVE-2022-3767, CVE-2022-3793, CVE-2022-3818, CVE-2022-3819)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?407d35a4

http://www.nessus.org/u?e8699e4a

Plugin Details

Severity: Critical

ID: 167044

File Name: freebsd_pkg_16f7ec685cce11ed9be7454b1dd82c64.nasl

Version: 1.7

Type: local

Published: 11/5/2022

Updated: 10/5/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2022-3726

CVSS v3

Risk Factor: Critical

Base Score: 9

Temporal Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:gitlab-ce, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/5/2022

Vulnerability Publication Date: 11/5/2022

Reference Information

CVE: CVE-2022-2251, CVE-2022-2761, CVE-2022-3265, CVE-2022-3280, CVE-2022-3413, CVE-2022-3483, CVE-2022-3486, CVE-2022-3706, CVE-2022-3726, CVE-2022-3767, CVE-2022-3793, CVE-2022-3818, CVE-2022-3819

IAVA: 2022-A-0468-S