
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was identified in GitLab CE/EE affecting all versions from 1.0 prior to 15.8.5, 15.9 prior to 15.9.4, and 15.10 prior to 15.10.1 where non-printable characters could be copied from clipboard, allowing unexpected commands to be executed on victim machine (CVE Mitre, NVD).
The vulnerability exists in GitLab's web interface where the copy-to-clipboard functionality allows copying non-printable characters that are not visually represented in the interface. When a user copies content using the web interface button, these hidden characters are included in the clipboard, potentially leading to the execution of different commands than what is visibly displayed (GitLab Issue).
The vulnerability allows attackers to craft malicious commands that appear harmless but execute unexpected arbitrary system commands when pasted into a terminal. This can lead to system compromise, unauthorized access, or information disclosure. The attack impacts the availability, integrity, and confidentiality of the affected user's system (GitLab Issue).
The vulnerability has been patched in GitLab versions 15.8.5, 15.9.4, and 15.10.1. Users should upgrade to these or later versions. As a workaround, users should manually type commands instead of using the copy-to-clipboard functionality, or carefully inspect copied content before execution (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."