First published: Mon Sep 16 2019(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition 10.8 through 12.2.1. An internal endpoint unintentionally allowed group maintainers to view and edit group runner settings.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.8.0<12.0.8 | |
GitLab | >=10.8.0<12.0.8 | |
GitLab | >=12.1.0<12.1.8 | |
GitLab | >=12.1.0<12.1.8 | |
GitLab | >=12.2.0<12.2.3 | |
GitLab | >=12.2.0<12.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15721 has been classified as a medium severity vulnerability due to unauthorized access to group runner settings by maintainers.
To fix CVE-2019-15721, upgrade GitLab to version 12.2.3 or later.
CVE-2019-15721 affects GitLab Community and Enterprise Editions from version 10.8 to 12.2.1.
An attacker with maintainer access can view and edit group runner settings, potentially compromising CI/CD pipelines.
There are no official workarounds for CVE-2019-15721; the recommended action is to apply the security update.