Vulnerability Description
GitLab Community and Enterprise Edition before 10.7.7, 10.8.x before 10.8.6, and 11.x before 11.0.4 allows Directory Traversal with write access and resultant remote code execution via the GitLab projects import component.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | < 10.7.7 |
Related Weaknesses (CWE)
References
- https://about.gitlab.com/2018/07/17/critical-security-release-gitlab-11-dot-0-doVendor Advisory
- https://gitlab.com/gitlab-org/gitlab-ce/issues/49133ExploitVendor Advisory
- https://hackerone.com/reports/378148ExploitThird Party Advisory
- https://about.gitlab.com/2018/07/17/critical-security-release-gitlab-11-dot-0-doVendor Advisory
- https://gitlab.com/gitlab-org/gitlab-ce/issues/49133ExploitVendor Advisory
- https://hackerone.com/reports/378148ExploitThird Party Advisory
FAQ
What is CVE-2018-14364?
CVE-2018-14364 is a vulnerability with a CVSS score of 9.8 (CRITICAL). GitLab Community and Enterprise Edition before 10.7.7, 10.8.x before 10.8.6, and 11.x before 11.0.4 allows Directory Traversal with write access and resultant remote code execution via the GitLab proj...
How severe is CVE-2018-14364?
CVE-2018-14364 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-14364?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.