First published: Mon Sep 09 2019(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition 9.x, 10.x, and 11.x before 11.8.9, 11.9.x before 11.9.10, and 11.10.x before 11.10.2. Gitaly has allows an information disclosure issue where HTTP/GIT credentials are included in logs on connection errors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=9.0.0<=9.3.7 | |
GitLab | >=9.0.0<=9.3.7 | |
GitLab | >=10.0.0<=10.8.7 | |
GitLab | >=10.0.0<=10.8.7 | |
GitLab | >=11.0.0<11.8.9 | |
GitLab | >=11.0.0<11.8.9 | |
GitLab | >=11.9.0<11.9.10 | |
GitLab | >=11.9.0<11.9.10 | |
GitLab | >=11.10.0<11.10.2 | |
GitLab | >=11.10.0<11.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11549 has been classified as a medium severity vulnerability as it allows potential information disclosure.
To fix CVE-2019-11549, upgrade to GitLab version 11.8.9, 11.9.10, or 11.10.2 or later.
CVE-2019-11549 affects GitLab Community and Enterprise Editions version 9.x through 11.x up to specified versions.
CVE-2019-11549 exploits an information disclosure issue in Gitaly where HTTP/GIT credentials may be logged on connection errors.
The potential risks of CVE-2019-11549 include unauthorized access to sensitive credentials that could compromise repository security.