First published: Wed Mar 21 2018(Updated: )
Gitlab Enterprise Edition version 10.1.0 is vulnerable to an insufficiently protected credential issue in the project service integration API endpoint resulting in an information disclosure of plaintext password.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gitlab | 16.0.8+ds1-2 | |
GitLab | >=8.0.0<=9.5.10 | |
GitLab | >=8.0.0<=9.5.10 | |
GitLab | >=10.0.0<=10.1.5 | |
GitLab | >=10.0.0<=10.1.5 | |
GitLab | >=10.2.0<=10.2.5 | |
GitLab | >=10.2.0<=10.2.5 | |
GitLab | >=10.3.0<=10.3.3 | |
GitLab | >=10.3.0<=10.3.3 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0925 is classified as a medium severity vulnerability due to its potential for information disclosure of plaintext passwords.
To remediate CVE-2017-0925, upgrade GitLab to version 10.1.6 or later.
CVE-2017-0925 affects GitLab Community and Enterprise Editions from version 8.0.0 to 10.1.5.
CVE-2017-0925 represents an insufficiently protected credential issue in the project service integration API endpoint.
The impact of CVE-2017-0925 on users is the potential exposure of sensitive information, specifically plaintext passwords.