First published: Sat Apr 15 2023(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. Remote attackers could obtain sensitive information about issues, comments, and project titles via events API insecure direct object reference.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <11.1.7 | |
GitLab | <11.1.7 | |
GitLab | >=11.2.0<11.2.4 | |
GitLab | >=11.2.0<11.2.4 | |
GitLab | =11.3.0 | |
GitLab | =11.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17449 has a medium severity rating due to the potential exposure of sensitive information.
To fix CVE-2018-17449, upgrade to GitLab versions 11.1.7, 11.2.4, or 11.3.1 or later.
CVE-2018-17449 is categorized as an insecure direct object reference vulnerability.
CVE-2018-17449 could expose sensitive information about issues, comments, and project titles.
CVE-2018-17449 affects GitLab versions before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1.