First published: Thu Apr 04 2019(Updated: )
GitLab Community and Enterprise Edition before 11.3.14, 11.4.x before 11.4.12, and 11.5.x before 11.5.5 allows Directory Traversal.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <11.3.14 | |
GitLab | <11.3.14 | |
GitLab | >=11.4.0<11.4.12 | |
GitLab | >=11.4.0<11.4.12 | |
GitLab | >=11.5.0<11.5.5 | |
GitLab | >=11.5.0<11.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20229 is classified as a critical vulnerability due to its potential for directory traversal attacks.
To resolve CVE-2018-20229, you should update to GitLab versions 11.3.14, 11.4.12, or 11.5.5 or later.
CVE-2018-20229 affects GitLab Community and Enterprise Editions prior to versions 11.3.14, 11.4.12, and 11.5.5.
CVE-2018-20229 allows for directory traversal attacks, which can expose sensitive files on the server.
Yes, CVE-2018-20229 is a publicly known vulnerability that has been documented and reported.