First published: Wed Jul 10 2019(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition 10.x and 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. There is an incorrect access control vulnerability that permits a user with insufficient privileges to promote a project milestone to a group milestone.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.0.0<11.3.11 | |
GitLab | >=10.0.0<11.3.11 | |
GitLab | >=11.4.0<11.4.8 | |
GitLab | >=11.4.0<11.4.8 | |
GitLab | >=11.5.0<11.5.1 | |
GitLab | >=11.5.0<11.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19496 has a medium severity due to the potential for unauthorized promotion of project milestones.
To fix CVE-2018-19496, upgrade GitLab to version 11.3.11, 11.4.8 or 11.5.1 or later.
CVE-2018-19496 affects GitLab Community and Enterprise Edition versions 10.x and 11.x prior to 11.3.11, 11.4.x prior to 11.4.8, and 11.5.x prior to 11.5.1.
CVE-2018-19496 is an incorrect access control vulnerability.
Yes, CVE-2018-19496 can lead to privilege escalation by allowing users with insufficient rights to promote milestones.