First published: Wed Dec 18 2019(Updated: )
An information exposure vulnerability exists in gitlab.com <v12.3.2, <v12.2.6, and <v12.1.10 when using the blocking merge request feature, it was possible for an unauthenticated user to see the head pipeline data of a public project even though pipeline visibility was restricted.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <12.1.10 | |
GitLab | <12.1.10 | |
GitLab | >=12.2.0<12.2.6 | |
GitLab | >=12.2.0<12.2.6 | |
GitLab | >=12.3.0<12.3.2 | |
GitLab | >=12.3.0<12.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-15580 is categorized as medium.
To fix CVE-2019-15580, you should upgrade GitLab to version 12.3.3 or later.
CVE-2019-15580 affects GitLab versions 12.1.10 and earlier, 12.2.6 and earlier, and 12.3.2 and earlier.
CVE-2019-15580 exposes head pipeline data of public projects to unauthenticated users.
Yes, CVE-2019-15580 can be exploited by unauthenticated users.