- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
08-24-2022 08:40 PM
Hi,
Does anyone know if GitLab Remote Command Execution Vulnerability is covered with Palo Alto AV Signature?
Is Palo Alto affected by it?
I was not able to find it in their Security Advisories.
Vulnerability Details:
Title |
GitLab Remote Command Execution Vulnerability |
CVE ID |
CVE-2022-2884 |
CVE Summary |
GitLab Community Edition and GitLab Enterprise Edition are prone to remote code-execution vulnerabilities via GitHub Import. An attacker can leverage this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial of service conditions.
The vulnerability has a CVSS base score of 9.9. |
Link(s) |
https://about.gitlab.com/releases/2022/08/22/critical-security-release-gitlab-15-3-1-released/ |
08-29-2022 12:31 PM
Hello,
Here is the PAN threat vault.
https://threatvault.paloaltonetworks.com/
I did a quick search and didnt find it. I bet PAN is working on one.
Regards,
01-09-2023 06:27 PM
A signature was already released. It's a vulnerability protection signature (not an AV signature).
https://threatvault.paloaltonetworks.com/?query=CVE-2022-2884&type=
Palo Alto Networks Firewall is not using GitLab, thus not affected by CVE-2022-2884.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!