git: 526c20a17e7c - main - security/vuxml: document gitlab-ce vulnerabilities

From: Matthias Fechner <mfechner_at_FreeBSD.org>
Date: Sat, 09 Jul 2022 06:09:36 UTC
The branch main has been updated by mfechner:

URL: https://cgit.FreeBSD.org/ports/commit/?id=526c20a17e7ca88927396029029fbcdf52a4b6ae

commit 526c20a17e7ca88927396029029fbcdf52a4b6ae
Author:     Matthias Fechner <mfechner@FreeBSD.org>
AuthorDate: 2022-07-09 06:09:01 +0000
Commit:     Matthias Fechner <mfechner@FreeBSD.org>
CommitDate: 2022-07-09 06:09:01 +0000

    security/vuxml: document gitlab-ce vulnerabilities
---
 security/vuxml/vuln-2022.xml | 58 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 58 insertions(+)

diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index 6a30cbfcbf8c..f6e25452953f 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,61 @@
+  <vuln vid="d1b35142-ff4a-11ec-8be3-001b217b3468">
+    <topic>Gitlab -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>gitlab-ce</name>
+	<range><ge>15.1.0</ge><lt>15.1.1</lt></range>
+	<range><ge>15.0.0</ge><lt>15.0.4</lt></range>
+	<range><ge>0</ge><lt>14.10.5</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Gitlab reports:</p>
+	<blockquote cite="https://about.gitlab.com/releases/2022/06/30/critical-security-release-gitlab-15-1-1-released/">
+	  <p>Remote Command Execution via Project Imports</p>
+	  <p>XSS in ZenTao integration affecting self hosted instances without strict CSP</p>
+	  <p>XSS in project settings page</p>
+	  <p>Unallowed users can read unprotected CI variables</p>
+	  <p>IP allow-list bypass to access Container Registries</p>
+	  <p>2FA status is disclosed to unauthenticated users</p>
+	  <p>CI variables provided to runners outside of a group's restricted IP range</p>
+	  <p>IDOR in sentry issues</p>
+	  <p>Reporters can manage issues in error tracking</p>
+	  <p>Regular Expression Denial of Service via malicious web server responses</p>
+	  <p>Unauthorized read for conan repository</p>
+	  <p>Open redirect vulnerability</p>
+	  <p>Group labels are editable through subproject</p>
+	  <p>Release titles visible for any users if group milestones are associated with any project releases</p>
+	  <p>Restrict membership by email domain bypass</p>
+	  <p>Job information is leaked to users who previously were maintainers via the Runner Jobs API endpoint</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2022-2185</cvename>
+      <cvename>CVE-2022-2235</cvename>
+      <cvename>CVE-2022-2230</cvename>
+      <cvename>CVE-2022-2229</cvename>
+      <cvename>CVE-2022-1983</cvename>
+      <cvename>CVE-2022-1963</cvename>
+      <cvename>CVE-2022-2228</cvename>
+      <cvename>CVE-2022-2243</cvename>
+      <cvename>CVE-2022-2244</cvename>
+      <cvename>CVE-2022-1954</cvename>
+      <cvename>CVE-2022-2270</cvename>
+      <cvename>CVE-2022-2250</cvename>
+      <cvename>CVE-2022-1999</cvename>
+      <cvename>CVE-2022-2281</cvename>
+      <cvename>CVE-2022-1981</cvename>
+      <cvename>CVE-2022-2227</cvename>
+      <url>https://about.gitlab.com/releases/2022/06/30/critical-security-release-gitlab-15-1-1-released/</url>
+    </references>
+    <dates>
+      <discovery>2022-06-30</discovery>
+      <entry>2022-07-09</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="b9210706-feb0-11ec-81fa-1c697a616631">
     <topic>Node.js -- July 7th 2022 Security Releases</topic>
     <affects>