First published: Sat Apr 15 2023(Updated: )
An issue was discovered in GitLab Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. Attackers could obtain sensitive information about group names, avatars, LDAP settings, and descriptions via an insecure direct object reference to the "merge request approvals" feature.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <11.1.7 | |
GitLab | <11.1.7 | |
GitLab | >=11.2.0<11.2.4 | |
GitLab | >=11.2.0<11.2.4 | |
GitLab | =11.3.0 | |
GitLab | =11.3.0 | |
<11.1.7 | ||
<11.1.7 | ||
>=11.2.0<11.2.4 | ||
>=11.2.0<11.2.4 | ||
=11.3.0 | ||
=11.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17455 is a vulnerability in GitLab that allows attackers to access sensitive information through insecure direct object references.
CVE-2018-17455 affects GitLab Enterprise Edition before 11.1.7, and GitLab Community Edition and Enterprise Edition between versions 11.2.0 and 11.2.4, as well as 11.3.0.
The potential impact of CVE-2018-17455 includes unauthorized access to sensitive information such as group names, avatars, LDAP settings, and descriptions.
To fix CVE-2018-17455, upgrade to GitLab versions 11.1.7, 11.2.4, or 11.3.1 or later.
CVE-2018-17455 is classified as a medium-severity vulnerability due to the risk of information disclosure.