The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 275ac414-b847-11ef-9877-2cf05da270f3 advisory. Gitlab reports: Injection of Network Error Logging (NEL) headers in kubernetes proxy response could lead to ATO abusing OAuth flows Denial of Service by repeatedly sending unauthenticated requests for diff-files CI_JOB_TOKEN could be used to obtain GitLab session Open redirect in releases API Client-Side Path Traversal in Harbor artifact links HTML injection in vulnerability details could lead to Cross Site Scripting Leak branch names of projects with confidential repository Non member can view unresolved threads marked as internal notes Uncontrolled Resource Consumption through a maliciously crafted file Certain sensitive information passed as literals inside GraphQL mutations retained in GraphQL logs Information disclosure of confidential incidents details to a group member in Gitlab Wiki Domain Confusion in GitLab Pages Unique Domain Implementation Tenable has extracted the preceding description block directly from the FreeBSD security advisory. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version…Read More
References
Back to Main