First published: Tue Jan 28 2020(Updated: )
Improper authentication exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE) in the GitLab SAML integration had a validation issue that permitted an attacker to takeover another user's account.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.1.0<12.1.12 | |
GitLab | >=12.1.0<12.1.12 | |
GitLab | >=12.2.0<12.2.6 | |
GitLab | >=12.2.0<12.2.6 | |
GitLab | >=12.3.0<12.3.2 | |
GitLab | >=12.3.0<12.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15585 has a severity rating of high due to its potential to allow account takeover via improper authentication in GitLab's SAML integration.
To fix CVE-2019-15585, upgrade GitLab to version 12.3.2 or later, or to version 12.2.6 or later, or to version 12.1.12 or later.
CVE-2019-15585 affects GitLab Community Edition and Enterprise Edition versions prior to 12.3.2, 12.2.6, and 12.1.12.
CVE-2019-15585 exploits a validation issue in GitLab's SAML integration which can allow an attacker to take over another user's account.
Users of affected versions of GitLab Community and Enterprise Editions are at risk for CVE-2019-15585 if they have enabled SAML integration.