Skip to content

Latest commit

 

History

History
249 lines (249 loc) · 29 KB

File metadata and controls

249 lines (249 loc) · 29 KB

Reports in gitlab program:

S.No Title Bounty
1 RCE via the DecompressedArchiveSizeValidator and Project BulkImports (behind feature flag) $33510.0
2 Remote Command Execution via Github import $33510.0
3 Arbitrary file read via the bulk imports UploadsPipeline $29000.0
4 RepositoryPipeline allows importing of local git repos $22300.0
5 Arbitrary file read via the UploadsRewriter when moving and issue $20000.0
6 RCE via unsafe inline Kramdown options when rendering certain Wiki pages $20000.0
7 RCE when removing metadata with ExifTool $20000.0
8 Private objects exposed through project import $20000.0
9 Steal private objects of other projects via project import $20000.0
10 Arbitrary file read during project import $16000.0
11 Stored XSS in markdown via the DesignReferenceFilter $16000.0
12 Stored XSS in Notes (with CSP bypass for gitlab.com) $13950.0
13 XSS in ZenTao integration affecting self hosted instances without strict CSP $13950.0
14 New /add_contacts /remove_contacts quick commands susseptible to XSS from Customer Contact firstname/lastname fields $13950.0
15 Stored XSS via Kroki diagram $13950.0
16 Bypass of GitLab CI runner slash fix in YAML validation $12000.0
17 JSON serialization of any Project model results in all Runner tokens being exposed through Quick Actions $12000.0
18 Local files could be overwritten in GitLab, leading to remote command execution $12000.0
19 Project Template functionality can be used to copy private project data, such as repository, confidential issues, snippets, and merge requests $12000.0
20 Git flag injection - local file overwrite to remote code execution $12000.0
21 Path traversal in Nuget Package Registry $12000.0
22 Path traversal, to RCE $12000.0
23 Exfiltrate and mutate repository and project data through injected templated service $11000.0
24 SSRF on project import via the remote_attachment_url on a Note $10000.0
25 gitlab-workhorse bypass in Gitlab::Middleware::Multipart allowing files in allowed_paths to be read $10000.0
26 Arbitrary POST request as victim user from HTML injection in Jupyter notebooks $8690.0
27 Content injection in Jira issue title enabling sending arbitrary POST request as victim $8690.0
28 DOS via issue preview $7640.0
29 Git flag injection - Search API with scope 'blobs' $7000.0
30 Stored XSS in markdown when redacting references $5000.0
31 Persistent XSS in Note objects $4500.0
32 Unauthenticated blind SSRF in OAuth Jira authorization controller $4000.0
33 SafeParamsHelper::safe_params is not so safe $4000.0
34 information disclosure of secret_key_base via encoding charcters $3500.0
35 Cross-site Scripting (XSS) - Stored in RDoc wiki pages $3500.0
36 Git flag injection leading to file overwrite and potential remote code execution $3500.0
37 Stored XSS in merge request pages $3500.0
38 CSRF on /api/graphql allows executing mutations through GET requests $3370.0
39 DoS on the Issue page by exploiting Mermaid. $3000.0
40 Bypass Email Verification -- Able to Access Internal Gitlab Services that use Login with Gitlab and Perform Check on email domain $3000.0
41 Initial mirror user can be assigned by other user even if the mirror was removed $3000.0
42 Injection of http.<url>.* git config settings leading to SSRF $3000.0
43 Stored XSS on PyPi simple API endpoint $3000.0
44 Ability to bypass email verification for OAuth grants results in accounts takeovers on 3rd parties $3000.0
45 Stored XSS on the job page $3000.0
46 XSS in request approvals $3000.0
47 Stored DOM XSS via Mermaid chart $3000.0
48 Stored XSS via Mermaid Prototype Pollution vulnerability $3000.0
49 Stored XSS in custom emoji $3000.0
50 Stored XSS in main page of a project caused by arbitrary script payload in group "Default initial branch name" $3000.0
51 Stored XSS via Mermaid Prototype Pollution vulnerability $3000.0
52 Stored XSS in merge request creation page through payload in approval rule name $3000.0
53 RCE via WikiCloth markdown rendering if the rubyluabridge gem is installed $3000.0
54 Stored XSS on issue comments and other pages which contain notes $3000.0
55 Stored XSS in "Create Groups" $2500.0
56 Account takeover due to insufficient URL validation on RelayState parameter $2450.0
57 DOS via move_issue $2300.0
58 SQL injection in MilestoneFinder order method $2000.0
59 Command injection by overwriting authorized_keys file through GitLab import $2000.0
60 GitLab CI runner can read and poison cache of all other projects $2000.0
61 GitLab's GitHub integration is vulnerable to SSRF vulnerability $2000.0
62 Stored XSS in group issue list $2000.0
63 When you call your branch the same name as a git hash, it could be checked out by dependents $2000.0
64 Stored XSS in repository file viewer $2000.0
65 Unauthenticated IP allowlist bypass when accessing job artifacts through gitlab pages at {group_id}.gitlab.io $1990.0
66 Attacker is able to create,Edit & delete notes and leak the title of a victim's private personal snippet $1730.0
67 Gitlab Pages token theft using service workers $1680.0
68 Blocked user Git access through CI/CD token $1500.0
69 Bypass Email Verification using Salesforce -- Reproducible in gitlab.com $1500.0
70 Revoked User can still view the Merge Request created by him via API $1500.0
71 A deactivated user can access data through GraphQL $1370.0
72 Change project visibility to a restricted option $1370.0
73 Attacker can create malicious child epics linked to a victim's epic in an unrelated group $1160.0
74 IDOR Exposes All Machine Learning Models $1160.0
75 XSS by clicking Jira's link $1130.0
76 HTML injection possible with soft email confirmations when Administrator manually confirms attacker email address $1060.0
77 Privilege escalation of "external user" (with maintainer privilege) to internal access through project token $1020.0
78 Claiming package names in GitLab's automatic package referencer. $1000.0
79 All functions that allow users to specify color code are vulnerable to ReDoS $1000.0
80 DoS attack via comment on Issue $1000.0
81 Private System Note Disclosure using GraphQL $1000.0
82 No redirect_uri in the db for web-internal clientKey leads to one-click DoS on gitter.im $1000.0
83 Instant open redirect on Live preview WEB Ide opening $1000.0
84 Improper access control for users with expired password, giving the user full access through API and Git $950.0
85 Using GitLab to monitor and hijack domains in mass quantity. $750.0
86 Evaluating Ruby code by injecting Rescue job on the system_hook_push queue through web hook $750.0
87 GitHub import allows user to create child group under existing namespace $750.0
88 Drive-by arbitrary file deletion in the GDK via letter_opener_web gem $750.0
89 Guest users can create new test cases $650.0
90 Guest Users can create issues for Sentry errors and track their status $610.0
91 IDOR in "external status check" API leaks data about any status check on the instance $610.0
92 "External status checks" can be accepted by users below developer access if the user is either author or assignee of the target merge request $610.0
93 Reporters can upload design to issues using the "Move to" feature $600.0
94 ReDoS in syntax highlighting due to Rouge $600.0
95 EXIF metadata not stripped from JPG group logos $500.0
96 [Admin Panel] CSRF to resume/pause runner $500.0
97 View the Starred Projects in a Private Profile $500.0
98 Snippet JS template allows attacker to read a user's private snippets $300.0
99 A profile page of a user can be denied from loading by appending .html to the username $200.0
100 Domain Takeover - gl-canary.freetls.fastly.net $200.0
101 Guest users can change the confidentiality attribute on those issues that have been assigned to them $100.0
102 Installing Gitlab runner with Docker-In-Docker allows root access $100.0
103 Information Disclosure - Pvt Gitlab Issue Disclosing Through GitLab Unfiltered YouTube channel. $100.0
104 Remove obsolete domain from handbook subdomain $100.0
105 XSS On meta tags in profile page $0.0
106 Boards leak private label names and desciptions $0.0
107 Insecure 2FA/authentication implementation creates a brute force vulnerability $0.0
108 Read files on application server, leads to RCE $0.0
109 Ability to access all user authentication tokens, leads to RCE $0.0
110 State filter in IssuableFinder allows attacker to delete all issues and merge requests $0.0
111 Mailgun misconfiguration leads to email snooping and postmaster@-access on email.mg.gitlab.com $0.0
112 Users with guest access can post notes to private merge requests, issues, and snippets $0.0
113 User with guest access can access private merge requests $0.0
114 Every user can delete public deploy keys $0.0
115 Users can download old project exports due to unclaimed namespace $0.0
116 [RDoc] XSS in project README files $0.0
117 [Textile] XSS in project README files $0.0
118 [reStructuredText] XSS in project README files $0.0
119 Gitlab.com is vulnerable to reverse tabnabbing. $0.0
120 [Subgroups] Unprivileged User Can Disclose Private Group Names $0.0
121 [Repository Import] Open Redirect via "continue[to]" parameter $0.0
122 Open redirect $0.0
123 Unfiltered class attribute in markdown code $0.0
124 CSRF Token Bypass in Account Deletion $0.0
125 Markdown based stored XSS (IE only) $0.0
126 Stored XSS on Files overview by abusing git submodule URL $0.0
127 Gitlab.com is vulnerable to reverse tabnabbing via AsciiDoc links. (#3) $0.0
128 Gitlab.com is vulnerable to reverse tabnabbing. (#2) $0.0
129 GFM renderer leaks external issue tracker URL of private project $0.0
130 Missing/Breach of Internal Security Boundary - Access to Job Queue Results in Remote Code Execution $0.0
131 CSV injection in gitlab.com via issues export feature. $0.0
132 Gitlab is vulnerable to impersonation attacks due to broken links $0.0
133 Impersonation attack via Broken Link in Resellers Page $0.0
134 Access to GitLab's Slack by abusing issue creation from e-mail $0.0
135 all private tokens are leaked to an unauthenticated attacker $0.0
136 Race condition in GitLab import, giving access to other people their imports due to filename collision $0.0
137 CSRF-Token leak by request forgery $0.0
138 [Markdown] Stored XSS via character encoding parser bypass $0.0
139 SSRF vulnerability in gitlab.com via project import. $0.0
140 SSRF via git Repo by URL Abuse $0.0
141 Lack of validation before assigning custom domain names leading to abuse of GitLab pages service $0.0
142 Cookie bomb $0.0
143 SSRF vulnerability in gitlab.com webhook $0.0
144 SSRF when importing a project from a git repo by URL $0.0
145 XSS (Persistent) - Selecting role(s) for protected branches $0.0
146 Persistent XSS - Selecting users as allowed merge request approvers $0.0
147 Potensial SSRF via Git repository URL $0.0
148 HTML TAG INJECTION ON PROFILE NAME $0.0
149 Vulnerability in project import leads to arbitrary command execution $0.0
150 Persistent XSS - Deleting a project (No Longer Vulnerable in 10.7) $0.0
151 Stored XSS on Issue details page $0.0
152 Unauthorized users may be able to view almost all informations related to Private projects. $0.0
153 Stored XSS in merge request pages $0.0
154 Guests Will Disclose the Private Project Full Activity Via Project Activity Feeds $0.0
155 Inadequate cache control in gitter allows to view private chat room $0.0
156 Removing a user from a private group doesn't remove him from group's project, if his project's role was changed $0.0
157 SSRF in CI after first run $0.0
158 Full access to internal Gitlab instances at redash.gitlab.com, dashboards.gitlab.com, prometheus.gitlab.com $0.0
159 Attacker is able to access commit title and team member comments which are supposed to be private $0.0
160 Milestones leaked via search API $0.0
161 Access Projects And create projects in gitlab pre production server $0.0
162 Persistent XSS via e-mail when creating merge requests $0.0
163 Last build status and coverage leaked to unauthorized users $0.0
164 Stored XSS in Wiki pages $0.0
165 Add and Access to Labels of any Private Projects/Groups of Gitlab(IDOR) $0.0
166 Last pipeline status for MR leaked $0.0
167 Bypassing push rules via MRs created by Email $0.0
168 Clientside resource Exhausting by exploiting gitlab math rendering $0.0
169 Privilege escalation due to insecure use of logrotate $0.0
170 Know whether private project name exists or not within a group using link comments $0.0
171 GraphQL query "namespace" leaks data $0.0
172 Importing GitLab project archives can replace uploads of other users $0.0
173 GitLab::UrlBlocker validation bypass leading to full Server Side Request Forgery $0.0
174 Project Milestones Disclosed Via Groups When the Victim disabled milestones access in project settings $0.0
175 Head pipeline leaked to unauthorized users via blocking merge request feature $0.0
176 Container scanning and Dependency scanning report leaked to unauthorized users $0.0
177 Group search with Elastic search enable leaks unrelated data $0.0
178 Group search leaks private MRs, code, commits $0.0
179 Uncontrolled Resource Consumption in any Markdown field using Mermaid $0.0
180 Double linking cause XSS (but blokeced by CSP in gitlab.com) $0.0
181 Email notification about login email changed is not received when using verified linked email address $0.0
182 Server Side Request Forgery mitigation bypass $0.0
183 Send arbitrary PUT requests when user clicks on a link $0.0
184 Unrestricted file upload leads to Stored XSS $0.0
185 Stored XSS in blob viewer $0.0
186 Full Read SSRF on Gitlab's Internal Grafana $0.0
187 SSRF In plantuml (on plantuml.pre.gitlab.com) $0.0
188 Stealing data from customers.gitlab.com without user interaction $0.0
189 Privilege escalation from any user (including external) to gitlab admin when admin impersonates you $0.0
190 An attacker can run pipeline jobs as arbitrary user $0.0
191 SSRF into Shared Runner, by replacing dockerd with malicious server in Executor $0.0
192 Members from parent group keep their access level on a subgroup transfer and are invisible $0.0
193 Adding everyone to the repo due to the lack of rate limit $0.0
194 Transferring a public group to a private group doesn't remove code from the Elastichsearch API search result $0.0
195 Elasticsearch leaks data through the notes scope $0.0
196 Possibilty to purchase Ultimate - 1 Year (EDU or OSS) $0.0
197 Todos are not redacted when membership changes - Access to (confidential) issues and merge requests $0.0
198 Insufficient Type Check on GraphQL leading to Maintainer delete repository $0.0
199 Insufficient Type Check leading to Developer ability to delete Project, Repository, Group, ... $0.0
200 GitLab-Runner on Windows DOCKER_AUTH_CONFIG container host Command Injection $0.0
201 Unauthorized access to private project security dashboard $0.0
202 XSS on Issue reference numbers $0.0
203 CRLF injection & SSRF in git:// protocal lead to arbitrary code execution $0.0
204 Unauthorized user is able to access schedule pipeline variables and values $0.0
205 Store-XSS in error message of build-dependencies $0.0
206 Able to leak private email of any user given his/her username via graphql $0.0
207 Remote hacker can download all the files of master branch in public projects where everything is members only. $0.0
208 GraphQL Query leads to sensitive information disclosure $0.0
209 [information disclosure] Validate existence of a private project. $0.0
210 Ability To Delete User(s) Account Without User Interaction $0.0
211 Kroki Arbitrary File Read/Write $0.0
212 Responsible Disclosure of Privacy Leakage Issue $0.0
213 Stored-XSS on wiki pages $0.0
214 Stored-XSS in merge requests $0.0
215 FogBugz import attachment full SSRF requiring vulnerability in *.fogbugz.com $0.0
216 Stored-XSS in merge requests $0.0
217 Clipboard DOM-based XSS $0.0
218 Stored XSS in Mermaid when viewing Markdown files $0.0
219 Use of Ruby Forwardable module and runtime meta-programming may introduce vulnerabilities $0.0
220 Cache poisoning Denial of Service affecting assets.gitlab-static.net $0.0
221 Sending Arbitrary Requests through Jupyter Notebooks on gitlab.com and Self-Hosted GitLab Instances $0.0
222 Container escape on public GitLab CI runners $0.0
223 Bypass for Domain-level redirects (Unvalidated Redirects and Forwar) $0.0
224 Exposure of a valid Gitlab-Workhorse JWT leading to various bad things $0.0
225 Able to view hackerone reports attachments $0.0
226 Stored XSS for Grafana dashboard URL $0.0
227 Found Origin IP's lead to access to gitlab $0.0
228 Unauthorized access $0.0
229 ReDoS in net/http affects webhooks: Sidekiq job stuck at 100% CPU for a year $0.0
230 No Restriction on password $0.0
231 Path paths and file disclosure vulnerabilities at influxdb.quality.gitlab.net $0.0
232 XSS: v-safe-html is not safe enough $0.0
233 CSP-bypass XSS in project settings page $0.0
234 RCE via github import $0.0
235 Dependecy Confusion via Lookup Request Forwarding to PyPi.org $0.0
236 Bypass: Stored-XSS with CSP-bypass via scoped labels' color $0.0
237 Stored-XSS with CSP-bypass via labels' color $0.0
238 Blind SSRF in FogBugz project import $0.0
239 Arbitrary escape sequence injection in docker-machine from worker nodes $0.0
240 Stored-XSS injected in Wiki page via Banzai pipeline $0.0
241 Login email verification bypass via /oauth/token. $0.0
242 Removed Guest role user who dosent have access to private project in members able to view jobs $0.0
243 ReDoS due to device-detector parsing user agents $0.0
244 Maintainer can leak sentry token by changing the configured URL (fix bypass) $0.0
245 Subdomain takeover in Gitlab pages $0.0
246 DOS: taking down a 1k users Gitlab EE instance or multiple Sidekiq instances by importing a malicious repo from a Github EE self-hosted server $0.0