Skip to content
代码片段 群组 项目
该项目从 https://gitlab.com/gitlab-org/gitlab.git 镜像。 拉取镜像更新于
  1. 4月 24, 2024
  2. 4月 23, 2024
  3. 4月 22, 2024
  4. 4月 20, 2024
  5. 4月 19, 2024
    • Suraj Tripathi's avatar
      Saved MemberRoleId when passed · f2c4941c
      Suraj Tripathi 创作于
      - Moved Unique constraint validation to EE
      - Applied review comments
      
      EE: true
      Changelog: added
      f2c4941c
    • Vishwa Bhat's avatar
      Track Secret Detection vulnerabilities as they move within the file · 279e15ea
      Vishwa Bhat 创作于
      When a previously detected Secret moves within the file, this commit
      ensures to reuse the existing Secret Detection(SD) vulnerabilities from
      the database instead of creating newly detected duplicate findings. This
      is done with the help of tracking signature of the vulnerability generated
      using 'rule_value' algorithm.
      
      Refer: https://gitlab.com/gitlab-org/gitlab/-/issues/434096
      
      Changelog: added
      EE: true
      279e15ea
    • Terri Chu's avatar
      Fix N+1 queries with autocomplete recent items · 7fc709c5
      Terri Chu 创作于
      Changelog: fixed
      EE: true
      7fc709c5
    • Kevin-Damian Gosa's avatar
      Expose trigger short token to CI · e816eb68
      Kevin-Damian Gosa 创作于
      Changelog: added
      e816eb68
    • Nick Malcolm's avatar
      Add defense-in-depth against mass assignment in authn/z controllers · a77b872b
      Nick Malcolm 创作于
      In the future, we might make a change to how we handle user request
      parameters in a way that has unexpected and undesired consequence;
      specifically mass assignment vulnerabilities. (There are currently
      none known). These additional unit tests and/or explicit type-casts are
      intended to defend against that future scenario.
      
      For example: attempting to brute force a password by sending many
      passwords in a single request for a single user should never work. Nor
      should sending multiple OTP codes. The reason they _might_
      inadvertently work is because Ruby / Rails often doesn't mind if you
      send a string or an array of strings. For example:
      
      ```ruby
      # POST /vulnerable?email=fake@attacker.com
      > User.find_by(email: params[:email])
      # User Load (3.4ms)  SELECT "users".* FROM "users" WHERE "users"."email" = 'fake@attacker.com' LIMIT 1
      => nil
      
      # We expect email to be a string, but what if it's not?
      # POST /vulnerable?email[]=fake@attacker.com&email[]=admin@example.com
      > User.find_by(email: params[:email])
      # User Load (1.6ms)  SELECT "users".* FROM "users" WHERE "users"."email" IN ('fake@attacker.com', 'admin@example.com')
      => #<User id:1 @root>
      ```
      
      This work resolves https://gitlab.com/gitlab-org/gitlab/-/issues/442831+
      
      The methodology was to look at authentication & authorization-related
      controllers, and down into any Helpers/Services/etc that are called
      or included.
      a77b872b
    • Sam Word's avatar
      Added placeholder user type, no policies · b348beb5
      Sam Word 创作于
      Added new placeholder user_type, added Imports::SourceUser, and service
      to create them from imported user attributes.
      b348beb5
  6. 4月 18, 2024
  7. 4月 17, 2024
  8. 4月 16, 2024
加载中