First published: Tue Jan 28 2020(Updated: )
An IDOR exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE) that allowed a project owner or maintainer to see the members of any private group via merge request approval rules.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.1.0<12.1.12 | |
GitLab | >=12.1.0<12.1.12 | |
GitLab | >=12.2.0<12.2.6 | |
GitLab | >=12.2.0<12.2.6 | |
GitLab | >=12.3.0<12.3.2 | |
GitLab | >=12.3.0<12.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15581 has a moderate severity rating due to its potential impact on private group visibility in GitLab.
To fix CVE-2019-15581, upgrade to GitLab versions 12.3.2, 12.2.6, or 12.1.12 or later.
Both GitLab Community Edition and Enterprise Edition are affected by CVE-2019-15581.
Versions prior to 12.3.2, 12.2.6, and 12.1.12 of GitLab are vulnerable to CVE-2019-15581.
CVE-2019-15581 allows a project owner or maintainer to view the members of any private group via merge request approval rules.