First published: Sat Apr 15 2023(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition before 11.11.8, 12 before 12.0.6, and 12.1 before 12.1.6. Cookies for GitLab Pages (which have access control) could be sent over cleartext HTTP.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <11.11.8 | |
GitLab | <11.11.8 | |
GitLab | >=12.0.0<12.0.6 | |
GitLab | >=12.0.0<12.0.6 | |
GitLab | >=12.1.0<12.1.6 | |
GitLab | >=12.1.0<12.1.6 | |
<11.11.8 | ||
<11.11.8 | ||
>=12.0.0<12.0.6 | ||
>=12.0.0<12.0.6 | ||
>=12.1.0<12.1.6 | ||
>=12.1.0<12.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14942 is classified as a critical vulnerability due to the potential exposure of cookies over cleartext HTTP.
To mitigate CVE-2019-14942, upgrade GitLab to version 11.11.8 or later, or to 12.0.6 or later.
CVE-2019-14942 affects GitLab Community and Enterprise Editions prior to 11.11.8, as well as 12.x versions before 12.0.6 and 12.1.x versions before 12.1.6.
CVE-2019-14942 is an issue related to the transmission of sensitive cookies over unencrypted HTTP connections.
Yes, CVE-2019-14942 can potentially lead to data breaches due to the exposure of sensitive authentication cookies.