Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2018-3710
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Gitlab Community and Enterprise Editions version 10.3.3 is vulnerable to an Insecure Temporary File in the project import component resulting remote code execution.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
不安全的临时文件
Source: NVD (National Vulnerability Database)
Vulnerability Title
GitLab Community Edition和Enterprise Edition project import组件安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GitLab是一套利用Ruby on Rails开发的开源应用程序,可实现一个自托管的Git(版本控制系统)项目仓库,它拥有与Github类似的功能,可查阅项目的文件内容、提交历史、Bug列表等。GitLab Community Edition (CE)是社区版,Enterprise Edition (EE)是企业版。project import component是其中的一个项目导入组件。 Gitlab CE和EE 10.3.3版本中的project import组件存在安全漏洞。远程攻击者可利用该漏洞
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
GitLabGitLab Community and Enterprise Editions 8.9 - 10.1.5 Fixed in 10.1.6 -
II. Public POCs for CVE-2018-3710
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2018-3710
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2018-3710

No comments yet


Leave a comment