Published Wed, Aug 17th, 2022
Platforms
A critical vulnerability in GitLab's GitHub import feature allows remote code execution. The issue stems from improper handling of Sawyer::Resource objects, enabling injection of Redis commands. This can be escalated to execute arbitrary bash commands on the SaaS managed service as well as self-hosted GitLab servers, potentially leading to full system compromise.
GitLab Import
None required for SaaS service; self-hosted GitLab instances need to be updated to version 15.3.1
No tracked CVEs
Contributed by https://github.com/sshayb
Entry Status
Finalized
Disclosure Date
Tue, Aug 16th, 2022
Exploitability Period
-
Known ITW Exploitation
-
Detection Methods
Monitor for unexpected Redis commands or connections, especially those involving system_hook_push or PagesWorker. Check for unusual network connections or file system changes on GitLab servers.
Piercing Index Rating
-
Discovered by
yvvdwf