Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
CVE-2022-1963 CVSS:5.3
GitLab could allow a remote attacker to obtain sensitive information, caused by revealing two-factor authentication user account in the HTML source. A remote attacker could exploit this vulnerability to obtain a user account.
CVE-2022-2227 CVSS:3.1
GitLab could allow a remote attacker to bypass security restrictions, caused by improper access control in the runner jobs. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass access restrictions to access job and project metadata under certain conditions.
CVE-2022-2185 CVSS:9.9
GitLab could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a command injection vulnerability. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
CVE-2022-1999 CVSS:3.1
GitLab could allow a remote attacker to bypass security restrictions, caused by a error in REST API. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass access restrictions to change labels description.
CVE-2022-1983 CVSS:6.5
GitLab could allow a remote authhenticated attacker to bypass security restrictions, caused by improper access control. By misusing a valid Deploy Key or a Deploy Token, an attacker could exploit this vulnerability to bypass access restrictions to access Container Registries even when IP address restrictions were configured.
CVE-2022-1981 CVSS:2.7
GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by an error in the domain allow-list. By using the ‘Invite a group’ feature, an attacker could exploit this vulnerability to bypass access restrictions to invite a group that doesn’t comply with the domain allow-list.
Refer to GitLab Website for patch, upgrade or suggested workaround information.
GitLab Web site