vulnerability
Arch Linux: Arbitrary code execution (CVE-2021-22205)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Apr 23, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Apr 23, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that is passed to a file parser which resulted in a remote command execution. The issue is fixed in GitLab versions 13.10.3, 13.9.6 and 13.8.8.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-22205
- https://attackerkb.com/topics/CVE-2021-22205
- URL-http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html
- URL-http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html
- URL-https://about.gitlab.com/releases/2021/04/14/security-release-gitlab-13-10-3-released/
- URL-https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22205.json
- URL-https://gitlab.com/gitlab-org/gitlab/-/issues/327121
- URL-https://hackerone.com/reports/1154542
- URL-https://security.archlinux.org/ASA-202104-1
- CWE-94
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.