- May 30, 2019
-
-
GitLab Release Tools Bot authored
[ci skip]
-
GitLab Release Tools Bot authored
Add DNS rebinding protection settings See merge request gitlab/gitlabhq!3132
-
Stan Hu authored
This was renamed in GitLab 11.11, so the backport needs to use the original name.
-
Stan Hu authored
-
Oswaldo Ferreir authored
-
Oswaldo Ferreir authored
- May 28, 2019
-
-
GitLab Release Tools Bot authored
Reject slug+uri concat if slug is deemed unsafe See merge request gitlab/gitlabhq!3107
-
GitLab Release Tools Bot authored
Protect Gitlab::HTTP against DNS rebinding attack See merge request gitlab/gitlabhq!3115
-
GitLab Release Tools Bot authored
Persistent XSS in note objects CE See merge request gitlab/gitlabhq!3081
-
GitLab Release Tools Bot authored
Fix url redaction for issue links See merge request gitlab/gitlabhq!3089
-
GitLab Release Tools Bot authored
Disallow invalid MR branch name See merge request gitlab/gitlabhq!3093
-
GitLab Release Tools Bot authored
Hide issue title on unsubscribe for anonymous users See merge request gitlab/gitlabhq!3101
-
GitLab Release Tools Bot authored
Fix confidential issue label disclosure on milestone view See merge request gitlab/gitlabhq!3104
-
GitLab Release Tools Bot authored
Resolve: Milestones leaked via search API See merge request gitlab/gitlabhq!3112
-
GitLab Release Tools Bot authored
Prevent password sign in restriction bypass See merge request gitlab/gitlabhq!3119
-
GitLab Release Tools Bot authored
Update Knative version due to a security vulnerability See merge request gitlab/gitlabhq!3122
-
Tiger Watson authored
-
GitLab Release Tools Bot authored
Fix project visibility level validation See merge request gitlab/gitlabhq!3124
-
- May 27, 2019
-
-
Kerri Miller authored
First reported: https://gitlab.com/gitlab-org/gitlab-ce/issues/60143 When the page slug is "javascript:" and we attempt to link to a relative path (using `.` or `..`) the code will concatenate the slug and the uri. This MR adds a guard to that concat step that will return `nil` if the incoming slug matches against any of the "unsafe" slug regexes; currently this is only for the slug "javascript:" but can be extended if needed. Manually tested against a non-exhaustive list from OWASP of common javascript XSS exploits that have to to with mangling the "javascript:" method, and all are caught by this change or by existing code that ingests the user-specified slug.
-
- May 24, 2019
-
-
Peter Marko authored
-
Filipa Lacerda authored
Replaces a hard-coded date in the job app spec Closes #62283 See merge request gitlab-org/gitlab-ce!28709
-
- May 23, 2019
-
-
James Edwards-Jones authored
-
- May 22, 2019
-
-
Gitlab::HTTP now resolves the hostname only once, verifies the IP is not blocked, and then uses the same IP to perform the actual request, while passing the original hostname in the `Host` header and SSL SNI field.
-
- May 21, 2019
-
-
Felipe Artur authored
Fix milestone titles being leaked using search API when users cannot read milestones
-
- May 20, 2019
-
-
Alexandru Croitor authored
-
- May 19, 2019
-
-
Patrick Derichs authored
-
- May 06, 2019
-
-
Mark Chao authored
Prevents refspec as branch name, which would bypass branch protection when used in conjunction with rebase. HEAD seems to be a special case with lots of occurrence, so it is considered valid for now. Another special case is `refs/head/*`, which can be imported.
-
- May 03, 2019
-
-
Patrick Derichs authored
-
- May 01, 2019
-
-
Charlie Ablett authored
-
Charlie Ablett authored
-
- Apr 30, 2019
-
-
GitLab Release Tools Bot authored
[ci skip]
-
-
Ash McKenzie authored
-
Charlie Ablett authored
-
Charlie Ablett authored
-
Charlie Ablett authored
- Apr 29, 2019
-
-
GitLab Release Tools Bot authored
Disallow read user scope to read project events See merge request gitlab/gitlabhq!3088
-
- Apr 26, 2019
-