First published: Wed Jul 10 2019(Updated: )
GitLab CE/EE, versions 8.8 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an authorization vulnerability that allows access to the web-UI as a user using a Personal Access Token of any scope.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.8.0<11.3.11 | |
GitLab | >=8.8.0<11.3.11 | |
GitLab | >=11.4.0<11.4.8 | |
GitLab | >=11.4.0<11.4.8 | |
GitLab | >=11.5.0<11.5.1 | |
GitLab | >=11.5.0<11.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19569 is classified as a medium severity vulnerability due to its potential for unauthorized access.
To remediate CVE-2018-19569, upgrade your GitLab installation to a version higher than 11.3.11, 11.4.8, or 11.5.1.
CVE-2018-19569 affects GitLab CE/EE versions from 8.8 to 11.x before specific patch versions.
CVE-2018-19569 allows unauthorized users to access the web-UI using a Personal Access Token.
Yes, CVE-2018-19569 can be exploited remotely by attackers with access to valid Personal Access Tokens.