{"id":2690,"date":"2021-04-20T10:07:16","date_gmt":"2021-04-20T15:07:16","guid":{"rendered":"https:\/\/cert.pa\/?p=2690"},"modified":"2021-04-20T10:07:16","modified_gmt":"2021-04-20T15:07:16","slug":"csirt-panama-aviso-2021-04-19-multiples-vulnerabilidades-en-gitlab-y-ruby","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2690","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2021-04-19: M\u00faltiples vulnerabilidades en GitLab y Ruby"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2021-04-19: M\u00faltiples vulnerabilidades en GitLab y Ruby<\/p>\n\n\n\n<p>Gravedad: Alta<br>Fecha de publicaci\u00f3n: Abril 19, 2021<br>\u00daltima revisi\u00f3n: Abril 19, 2021<br>Sistemas Afectados:<br>\u2022 GitLab Community Edition (CE)\/Enterprise Edition (EE), versi\u00f3n 11.9 y posteriores.<br>\u2022 Ruby, versiones:<br>\u2022 2.5.8 o anteriores,<br>\u2022 2.6.7 o anteriores,<br>\u2022 2.7.2 o anteriores,<br>\u2022 3.0.1 o anteriores.<br>\u2022 REXML gem, versi\u00f3n 3.2.4 o anteriores.<\/p>\n\n\n\n<p>III. Descripci\u00f3n<br>Afectaci\u00f3n mediante 2 vulnerabilidades cr\u00edticas que afectan a GitLab y REXML, de tipo ejecuci\u00f3n remota de c\u00f3digo (RCE) y conversi\u00f3n de documentos XML.<br>IV. Impacto<br>Vulnerabilidades presentes:<br>\u2022 Se ha descubierto una vulnerabilidad en GitLab CE\/EE por la que no se validaban correctamente los archivos de imagen que se pasaban a un analizador de archivos, lo que daba lugar a la ejecuci\u00f3n remota de comandos.<br>\u2022 CVE-2021-28965: Al parsear y serializar un documento XML especialmente dise\u00f1ado, REXML gem (tambi\u00e9n el que se incluye con Ruby) puede crear un documento XML err\u00f3neo cuya estructura es diferente a la original.<br>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizaci\u00f3n en:<br>\u2022 GitLab CE\/EE, versiones 13.10.3, 13.9.6 y 13.8.8, mediante: https:\/\/about.gitlab.com\/update\/<br>\u2022 REXML gem a la versi\u00f3n 3.2.5 o posteriores, mediante: https:\/\/rubygems.org\/gems\/rexml\/versions\/3.2.5<br>Fuentes:<br>? Instituto Nacional de Ciberseguridad, INCIBE. Avisos Seguridad, Actualizaci\u00f3n de seguridad de Joomla. Recopilado en: https:\/\/www.incibe-cert.es\/alerta-temprana\/avisos-seguridad\/multiples-vulnerabilidades-gitlab-y-ruby<br>? GitLab Critical Security Release: 13.10.3, 13.9.6, and 13.8.8. 14 de abril del 2021. Recopilado en: https:\/\/about.gitlab.com\/releases\/2021\/04\/14\/security-release-gitlab-13-10-3-released\/<br>? CVE-2021-28965: XML round-trip vulnerability in REXML. 5 de abril del 2021. Recopilado en: https:\/\/www.ruby-lang.org\/en\/news\/2021\/04\/05\/xml-round-trip-vulnerability-in-rexml-cve-2021-28965\/<\/p>\n\n\n\n<p>Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2021-04-19: M\u00faltiples vulnerabilidades en GitLab y Ruby Gravedad: AltaFecha de publicaci\u00f3n: Abril 19, 2021\u00daltima revisi\u00f3n: Abril 19, 2021Sistemas Afectados:\u2022 GitLab Community Edition (CE)\/Enterprise Edition (EE), versi\u00f3n 11.9 y posteriores.\u2022 Ruby, versiones:\u2022 2.5.8&#8230;<\/p>\n","protected":false},"author":4,"featured_media":2691,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[72,144,145],"class_list":["post-2690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos-de-seguridad","tag-gitlab","tag-ruby"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2690"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2690\/revisions"}],"predecessor-version":[{"id":2692,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2690\/revisions\/2692"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/2691"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}