Vulnerabilities > CVE-2013-4490 - Remote Code Execution vulnerability in GitLab 'SSH key upload' Feature

047910
CVSS 6.5 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
gitlab
exploit available
metasploit

Summary

The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell before 1.7.3, as used in GitLab 5.0 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key. Per: http://cwe.mitre.org/data/definitions/77.html "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')"

Exploit-Db

descriptionGitlab-shell Code Execution. CVE-2013-4490. Remote exploit for linux platform
idEDB-ID:34362
last seen2016-02-03
modified2014-08-19
published2014-08-19
reportermetasploit
sourcehttps://www.exploit-db.com/download/34362/
titleGitlab-shell Code Execution

Metasploit

descriptionThis module takes advantage of the addition of authorized ssh keys in the gitlab-shell functionality of Gitlab. Versions of gitlab-shell prior to 1.7.4 used the ssh key provided directly in a system call resulting in a command injection vulnerability. As this relies on adding an ssh key to an account, valid credentials are required to exploit this vulnerability.
idMSF:EXPLOIT/MULTI/HTTP/GITLAB_SHELL_EXEC
last seen2020-06-08
modified2017-07-24
published2014-08-06
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/multi/http/gitlab_shell_exec.rb
titleGitlab-shell Code Execution

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/127916/gitlab_shell_exec.rb.txt
idPACKETSTORM:127916
last seen2016-12-05
published2014-08-18
reporterBrandon Knight
sourcehttps://packetstormsecurity.com/files/127916/Gitlab-shell-Code-Execution.html
titleGitlab-shell Code Execution