GMS-2017-112: Arbitrary shell execution
This release contains a fix for a security advisory related to the improper handling of shell commands. Uses of shell_exec()
and exec()
were not escaping filenames and configuration settings in most cases A properly crafted filename or configuration option would allow for arbitrary code execution when using some features.
References
Detect and mitigate GMS-2017-112 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →