| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|\
| |
| |
| |
| | |
Mask Sentry auth token
See merge request gitlab/gitlabhq!3504
|
| |
| |
| |
| |
| | |
This makes it so we mask Sentry's auth token. This mask only occurs in
the UI.
|
|\ \
| | |
| | |
| | |
| | | |
Private/internal repository enumeration via bruteforce on a vulnerable URL
See merge request gitlab/gitlabhq!3491
|
| |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This method, #route_not_found, is executed as the final fallback for
unrecognized routes (as the name might imply.) We want to avoid
`#authenticate_user!` when calling `#route_not_found`;
`#authenticate_user!` can, depending on the request format, return a 401
instead of redirecting to a login page. This opens a subtle security
exploit where anonymous users will receive a 401 response when
attempting to access a private repo, while a recognized user will
receive a 404, exposing the existence of the private, hidden repo.
|
| | |
|
|\ \
| | |
| | |
| | |
| | |
| | |
| | | |
'12-4-stable'
Only assign merge params when allowed
See merge request gitlab/gitlabhq!3487
|
| |/
| |
| |
| |
| |
| |
| |
| |
| | |
When a user updates a merge request coming from a fork, they should
not be able to set `force_remove_source_branch` if they cannot push
code to the source project.
Otherwise developers of the target project could remove the source
branch of the source project by setting this flag through the API.
|
|\ \
| | |
| | |
| | |
| | | |
Pass all wiki markup formats through our Banzai pipeline filters
See merge request gitlab/gitlabhq!3485
|
| |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Previously, when the wiki page format was anything other than `markdown`
or `asciidoc` the formatted content would be returned though a Gitaly
call. Gitaly in turn would delegate formatting to the gitlab-gollum-lib
gem, which in turn would delegate that to various gems (like RDoc for
`rdoc`) and then apply some very liberal sanitization.
It was too liberal!
This change brings our wiki content formatting in line with how we
format other markdown at GitLab, so we have a SSOT for sanitization.
https://gitlab.com/gitlab-org/gitlab/issues/30540
|
|\ \
| | |
| | |
| | |
| | | |
Require Maintainer permission on group where project is transferred to
See merge request gitlab/gitlabhq!3486
|
| |/ |
|
|\ \
| | |
| | |
| | |
| | | |
Use the '\A' and '\z' regex anchors in `InternalRedirect` to mitigate an Open Redirect issue.
See merge request gitlab/gitlabhq!3488
|
| |/
| |
| |
| |
| |
| | |
Open Redirect issue.
Fixes https://dev.gitlab.org/gitlab/gitlabhq/issues/2934 and https://gitlab.com/gitlab-org/gitlab/issues/33569
|
|\ \
| | |
| | |
| | |
| | |
| | |
| | | |
'security-2914-labels-visible-despite-no-access-to-issues-repositories-12-4' into '12-4-stable'
Labels visible despite no access to issues & repositories
See merge request gitlab/gitlabhq!3489
|
| |/
| |
| |
| | |
Use project scopes to filter project labels that are visible for user
|
|\ \
| | |
| | |
| | |
| | |
| | |
| | | |
'12-4-stable'
Project path reveals labels from Private project if the issue is moved to public project
See merge request gitlab/gitlabhq!3490
|
| |/
| |
| |
| |
| |
| | |
- Include new types in SystemNoteMetadata
- Add Label and Milestone reference_pattern to
Mentionable::ReferenceRegexes to be checked for cross references
|
|\ \
| | |
| | |
| | |
| | | |
Nested GraphQL query with circular relationship can cause Denial of Service
See merge request gitlab/gitlabhq!3492
|
| |/
| |
| |
| |
| |
| |
| |
| |
| |
| | |
- List all overly-recursive fields
- Reduce recursion threshold to 2
- Add test for not-recursive-enough query
- Use reusable methods in tests
- Add changelog
- Set changeable acceptable recursion level
- Add error check test helpers
|
|\ \
| | |
| | |
| | |
| | |
| | |
| | | |
'12-4-stable'
Filter out search results based on permissions to avoid bugs leaking data
See merge request gitlab/gitlabhq!3496
|
| | |
| | |
| | |
| | | |
This will be used later for search filtering.
|
| |/
| |
| |
| |
| |
| | |
This is to be more consistent as there is already a :read_note policy in
NotePolicy. To keep other behaviour the same we've introduced a
Note#noteable_ability_name that is used anywhere this was expected.
|
|\ \
| | |
| | |
| | |
| | |
| | |
| | | |
'security-65756-ex-admin-attacker-can-comment-in-internalsecurity-65756-ex-admin-attacker-can-comment-in-internal-12-4' into '12-4-stable'
Improper access control allows the attacker to comment in internal commit after they are no longer admin
See merge request gitlab/gitlabhq!3497
|
| |/ |
|
|/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
in a project members' list. Add tests for possible scenarios
Re-factor and remove N + 1 queries
Remove author from changelog
Don't use memoisation when not needed
Include users part of parents of project's group
Re-factor tests
Create and add users according to roles
Re-use group created earlier
Add incomplete test for ancestoral groups
Rename method to clarify category of groups
Skip pending test, remove comments not needed
Remove extra line
Include ancestors from invited groups as well
Add specs for participants service
Add more specs
Add more specs
use instead of
Use public group owner instead of project maintainer to test owner acess
Remove tests that have now been moved into participants_service_spec
Use :context instead of :all
Create nested group instead of creating an ancestor separately
Add comment explaining doubt on the failing spec
Imrpove test setup
Optimize sql queries
Refactor specs file
Add rubocop disablement
Add special case for project owners
Add small refactor
Add explanation to the docs
Fix wording
Refactor group check
Add small changes in specs
Add cr remarks
Add cr remarks
Add specs
Add small refactor
Add code review remarks
Refactor for better database usage
Fix failing spec
Remove rubocop offences
Add cr remarks
|
| |
|
|
|
|
|
|
| |
Add spec to test different combinations.
Accept string for required_minimum_access_level
Allow more flexible project membership query
|
|\
| |
| |
| |
| |
| |
| | |
'12-3-stable'
Prevent Bypassing Email Verification using Salesforce
See merge request gitlab/gitlabhq!3395
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Fix rubocop offences and add changelog
Add email_verified key for feature specs
Add code review remarks
Add code review remarks
Fix specs
|
|\ \
| | |
| | |
| | |
| | |
| | |
| | | |
'12-3-stable'
Check that SAML identity linking validates the origin of the request
See merge request gitlab/gitlabhq!3396
|
| |/
| |
| |
| |
| |
| |
| |
| | |
If the request wasn't initiated by gitlab we shouldn't add the new
identity to the user, and instead show that we weren't able to link
the identity to the user.
This should fix: https://gitlab.com/gitlab-org/gitlab-ce/issues/56509
|
|\ \
| | |
| | |
| | |
| | | |
Only render fixed number of mermaid blocks
See merge request gitlab/gitlabhq!3411
|
| | | |
|
|\ \ \
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
'security-12717-fix-confidential-issue-assignee-visible-to-guests-12-3' into '12-3-stable'
Display only participants that user has permission to see
See merge request gitlab/gitlabhq!3421
|
| | |/
| |/| |
|
|\ \ \
| | | |
| | | |
| | | |
| | | | |
Redirect user to root path after unsubscribing from private resource
See merge request gitlab/gitlabhq!3423
|
| |/ /
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
If user unsubsrcribes from a resource that they no longer have
access to they should not be revealed the resource path, but be
redirected to app root instead.
https://gitlab.com/gitlab-org/gitlab-ce/issues/64938
|
|\ \ \
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
'security-12718-project-milestones-disclosed-via-groups-12-3-ce' into '12-3-stable'
Hide disabled project milestones in project settings on group level
See merge request gitlab/gitlabhq!3424
|
| |/ / |
|
|\ \ \
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
'security-12630-private-system-note-disclosed-in-graphql-12-3-ce' into '12-3-stable'
Add policy check if cross reference system notes are accessible
See merge request gitlab/gitlabhq!3426
|
| |/ / |
|
|\ \ \
| | | |
| | | |
| | | |
| | | | |
Cancel all running CI jobs when user is blocked
See merge request gitlab/gitlabhq!3436
|
| |/ /
| | |
| | |
| | |
| | |
| | | |
This prevents a MITM attack where attacker could
still access Git repository if any jobs were
running long enough.
|
| | |
| | |
| | |
| | |
| | |
| | | |
Label events may use cross-project or cross-group references,
if the projects are not accessible by user, we don't show these
label events.
|
|/ / |
|
| | |
|
| | |
|
| | |
|
| | |
|