First published: Tue Mar 10 2020(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition 6.8 through 11.11. Users could bypass the mandatory external authentication provider sign-in restrictions by sending a specially crafted request. It has Improper Authorization.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=6.8.0<=11.11.0 | |
GitLab | >=6.8.0<=11.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12428 is considered a high-severity vulnerability due to its potential to allow unauthorized access.
To fix CVE-2019-12428, upgrade GitLab Community or Enterprise Edition to version 11.11.1 or later.
CVE-2019-12428 is classified as an Improper Authorization vulnerability.
CVE-2019-12428 affects GitLab Community and Enterprise Editions from versions 6.8 to 11.11.0.
Yes, CVE-2019-12428 can be exploited remotely by an attacker sending a specially crafted request.