### [CVE-2017-0916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0916) ![](https://img.shields.io/static/v1?label=Product&message=GitLab%20Community%20and%20Enterprise%20Editions&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20('Command%20Injection')%20(CWE-77)&color=brighgreen) ### Description Gitlab Community Edition version 10.3 is vulnerable to a lack of input validation in the system_hook_push queue through web hook component resulting in remote code execution. ### POC #### Reference - https://hackerone.com/reports/299473 #### Github - https://github.com/lanjelot/ctfs