First published: Wed Jul 10 2019(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. There is an SSRF vulnerability in the Prometheus integration.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <11.3.11 | |
GitLab | <11.3.11 | |
GitLab | >=11.4.0<11.4.8 | |
GitLab | >=11.4.0<11.4.8 | |
GitLab | >=11.5.0<11.5.1 | |
GitLab | >=11.5.0<11.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19495 is classified as a medium severity SSRF vulnerability affecting GitLab versions prior to specified patch releases.
To fix CVE-2018-19495, upgrade your GitLab Community or Enterprise Edition to version 11.3.11, 11.4.8, or 11.5.1 or later.
GitLab Community and Enterprise Editions before version 11.3.11, between 11.4.0 and 11.4.8, and between 11.5.0 and 11.5.1 are vulnerable to CVE-2018-19495.
CVE-2018-19495 is an SSRF (Server-Side Request Forgery) vulnerability found in the Prometheus integration of GitLab.
Yes, both GitLab Community and Enterprise Editions are affected by CVE-2018-19495.