First published: Fri Feb 14 2020(Updated: )
GitLab 12.2.2 and below contains a security vulnerability that allows a guest user in a private project to see the merge request ID associated to an issue via the activity timeline.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.2.0<12.0.8 | |
GitLab | >=11.2.0<12.0.8 | |
GitLab | >=12.1.0<12.1.8 | |
GitLab | >=12.1.0<12.1.8 | |
GitLab | >=12.2.0<12.2.3 | |
GitLab | >=12.2.0<12.2.3 | |
GitLab |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15592 is classified as a medium severity vulnerability that allows unauthorized information disclosure.
To fix CVE-2019-15592, you should upgrade your GitLab instance to version 12.2.3 or above.
CVE-2019-15592 affects all GitLab versions up to and including 12.2.2 for both community and enterprise editions.
CVE-2019-15592 is an information disclosure vulnerability that allows guest users to see sensitive merge request IDs.
Yes, guest users in private projects can access merge request IDs due to the vulnerability in CVE-2019-15592.