First published: Tue Dec 04 2018(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It allows SSRF.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=5.3<11.2.7 | |
GitLab | >=5.3<11.2.7 | |
GitLab | >=11.3.0<11.3.8 | |
GitLab | >=11.3.0<11.3.8 | |
GitLab | >=11.4.0<11.4.3 | |
GitLab | >=11.4.0<11.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18646 is considered a high severity vulnerability due to its potential for SSRF attacks.
To fix CVE-2018-18646, you should upgrade GitLab to version 11.2.7, 11.3.8, or 11.4.3, or later.
CVE-2018-18646 affects both the GitLab Community and Enterprise Editions before the specified patched versions.
Yes, CVE-2018-18646 can lead to unauthorized access to local services and may potentially result in data breaches.
SSRF, or Server-Side Request Forgery, is a vulnerability that allows an attacker to induce a server-side application to make requests to an unintended location.