First published: Mon Sep 16 2019(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition through 12.2.1. Embedded images and media files in markdown could be pointed to an arbitrary server, which would reveal the IP address of clients requesting the file from that server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <12.0.8 | |
GitLab | <12.0.8 | |
GitLab | >=12.1.0<12.1.8 | |
GitLab | >=12.1.0<12.1.8 | |
GitLab | >=12.2.0<12.2.3 | |
GitLab | >=12.2.0<12.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15726 is rated as a medium severity vulnerability due to its potential to leak client IP addresses.
To fix CVE-2019-15726, upgrade GitLab to version 12.2.3 or later.
CVE-2019-15726 affects GitLab Community and Enterprise Edition versions up to 12.2.1.
CVE-2019-15726 exposes users to privacy risks by revealing their IP addresses through embedded media files.
No official workaround is recommended for CVE-2019-15726; updating is the best way to mitigate the risk.