CVE-2017-16020: Code Injection
(updated )
Summit later allows an attacker to execute arbitrary commands via the collection name.
References
Detect and mitigate CVE-2017-16020 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →