Remote code execution vulnerability in the code search feature of GitLab
There is a remote code execution vulnerability in the code search feature
of GitLab. This vulnerability has been assigned the CVE identifier
CVE-2013-4489.
Versions affected: 5.2, 5.3, 5.4, 6.0, 6.1, 6.2
Not affected: 5.1 and earlier
Fixed Versions: 5.4.1, 6.2.3
Impact
- ---
The Grit gem which serves as the Git backend for GitLab has an unsafe code
path for internal use which allows strings to be evaluated by the Bourne
shell. In affected versions, the GitLab code search feature exposes this
unsafe code path to user input from the search box. Code search in GitLab
is only available for authenticated users.
All users running an affected release should upgrade immediately or disable
code search using the workaround below.
Releases
- ---
The 5.4.1 and 6.2.3 releases are available from
https://github.com/gitlabhq/gitlabhq and
https://gitlab.com/gitlab-org/gitlab-ce .
Workarounds
- ---
If you are unable to upgrade, you can disable code search by deleting the
following line from `app/contexts/search_context.rb` and restarting GitLab:
result[:blobs] = project.repository.search_files(query,
params[:repository_ref]) unless project.empty_repo?
Credits
- ---
Thanks to joernchen of http://www.phenoelit.org/ for reporting the
vulnerability to us.