First published: Sat Apr 15 2023(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition before 11.11.8, 12 before 12.0.6, and 12.1 before 12.1.6. Gitaly allows injection of command-line flags. This sometimes leads to privilege escalation or remote code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <11.11.8 | |
GitLab | <11.11.8 | |
GitLab | >=12.0.0<12.0.6 | |
GitLab | >=12.0.0<12.0.6 | |
GitLab | >=12.1.0<12.1.6 | |
GitLab | >=12.1.0<12.1.6 | |
<11.11.8 | ||
<11.11.8 | ||
>=12.0.0<12.0.6 | ||
>=12.0.0<12.0.6 | ||
>=12.1.0<12.1.6 | ||
>=12.1.0<12.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14944 has a severity rating that may allow for privilege escalation or remote code execution if exploited.
To fix CVE-2019-14944, you should upgrade your GitLab Community or Enterprise Edition to versions 11.11.8, 12.0.6, or 12.1.6 or later.
CVE-2019-14944 affects GitLab Community and Enterprise Editions prior to versions 11.11.8, 12.0.6, and 12.1.6.
CVE-2019-14944 can facilitate command injection, potentially leading to privilege escalation or remote code execution.
Yes, CVE-2019-14944 is considered a critical vulnerability due to its potential impact on system security.