Vulnerabilities > CVE-2013-4490 - Unspecified vulnerability in Gitlab and Gitlab-Shell

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
gitlab
exploit available
metasploit

Summary

The SSH key upload feature (lib/gitlab_keys.rb) in gitlab-shell before 1.7.3, as used in GitLab 5.0 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands via shell metacharacters in the public key.

Exploit-Db

descriptionGitlab-shell Code Execution. CVE-2013-4490. Remote exploit for linux platform
idEDB-ID:34362
last seen2016-02-03
modified2014-08-19
published2014-08-19
reportermetasploit
sourcehttps://www.exploit-db.com/download/34362/
titleGitlab-shell Code Execution

Metasploit

descriptionThis module takes advantage of the addition of authorized ssh keys in the gitlab-shell functionality of Gitlab. Versions of gitlab-shell prior to 1.7.4 used the ssh key provided directly in a system call resulting in a command injection vulnerability. As this relies on adding an ssh key to an account, valid credentials are required to exploit this vulnerability.
idMSF:EXPLOIT/MULTI/HTTP/GITLAB_SHELL_EXEC
last seen2020-06-08
modified2017-07-24
published2014-08-06
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/multi/http/gitlab_shell_exec.rb
titleGitlab-shell Code Execution

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/127916/gitlab_shell_exec.rb.txt
idPACKETSTORM:127916
last seen2016-12-05
published2014-08-18
reporterBrandon Knight
sourcehttps://packetstormsecurity.com/files/127916/Gitlab-shell-Code-Execution.html
titleGitlab-shell Code Execution