CVE-2019-10640Command Injection in Gitlab

CWE-77Command Injection5 documents5 sources
Severity
7.5HIGHNVD
EPSS
0.2%
top 61.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 15
Latest updateMay 24

Description

An issue was discovered in GitLab Community and Enterprise Edition before 11.7.10, 11.8.x before 11.8.6, and 11.9.x before 11.9.4. A regex input validation issue for the .gitlab-ci.yml refs value allows Uncontrolled Resource Consumption.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDgitlab/gitlab11.8.011.8.6+2
debiandebian/gitlab< gitlab 11.8.6+dfsg-1 (sid)
gitlabgitlab/gitlab

🔴Vulnerability Details

2
GHSA
GHSA-pqhq-pv8w-43hj: An issue was discovered in GitLab Community and Enterprise Edition before 112022-05-24
OSV
CVE-2019-10640: An issue was discovered in GitLab Community and Enterprise Edition before 112019-05-15

📋Vendor Advisories

2
GitLab
CVE-2019-10640: An issue was discovered in GitLab Community and Enterprise Edition before 11.7.10, 11.8.x before 11.8.6, and 11.9.x before 11.9.4. A regex input valid2019-05-15
Debian
CVE-2019-10640: gitlab - An issue was discovered in GitLab Community and Enterprise Edition before 11.7.1...2019