FreeBSD : Gitlab -- vulnerabilities (e2fb85ce-9a3c-11ee-af26-001b217b3468)

high Nessus Plugin ID 186894

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the e2fb85ce-9a3c-11ee-af26-001b217b3468 advisory.

- Gitlab reports: Smartcard authentication allows impersonation of arbitrary user using user's public certificate When subgroup is allowed to merge or push to protected branches, subgroup members with the Developer role may gain the ability to push or merge The GitLab web interface does not ensure the integrity of information when downloading the source code from installation packages or tags Project maintainer can escalate to Project owner using project access token rotate API Omission of Double Encoding in File Names Facilitates the Creation of Repositories with Malicious Content Unvalidated timeSpent value leads to unable to load issues on Issue board Developer can bypass predefined variables via REST API Auditor users can create merge requests on projects they don't have access to (CVE-2023-3511, CVE-2023-3904, CVE-2023-3907, CVE-2023-5061, CVE-2023-5512, CVE-2023-6051, CVE-2023-6564, CVE-2023-6680)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?5cb675db

http://www.nessus.org/u?86c14db0

Plugin Details

Severity: High

ID: 186894

File Name: freebsd_pkg_e2fb85ce9a3c11eeaf26001b217b3468.nasl

Version: 1.4

Type: local

Published: 12/14/2023

Updated: 12/22/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2023-3907

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:gitlab-ce, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 12/14/2023

Vulnerability Publication Date: 12/13/2023

Reference Information

CVE: CVE-2023-3511, CVE-2023-3904, CVE-2023-3907, CVE-2023-5061, CVE-2023-5512, CVE-2023-6051, CVE-2023-6564, CVE-2023-6680