First published: Mon Sep 16 2019(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition 10.1 through 12.2.1. Protections against SSRF attacks on the Kubernetes integration are insufficient, which could have allowed an attacker to request any local network resource accessible from the GitLab server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.1.0<12.0.8 | |
GitLab | >=10.1.0<12.0.8 | |
GitLab | >=12.1.0<12.1.8 | |
GitLab | >=12.1.0<12.1.8 | |
GitLab | >=12.2.0<12.2.3 | |
GitLab | >=12.2.0<12.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15728 is rated as a high severity vulnerability due to its potential for SSRF attacks allowing access to local network resources.
To fix CVE-2019-15728, update your GitLab instance to version 12.2.3 or later.
CVE-2019-15728 affects GitLab Community and Enterprise Editions from version 10.1.0 to 12.2.1.
CVE-2019-15728 allows attackers to execute SSRF (Server-Side Request Forgery) attacks targeting any local network resources accessible from the GitLab server.
No, CVE-2019-15728 has been resolved in GitLab versions released after 12.2.1.