First published: Mon Sep 16 2019(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition 8.14 through 12.2.1. The Jira integration contains a SSRF vulnerability as a result of a bypass of the current protection mechanisms against this type of attack, which would allow sending requests to any resources accessible in the local network by the GitLab server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.14.0<12.0.8 | |
GitLab | >=8.14.0<12.0.8 | |
GitLab | >=12.1.0<12.1.8 | |
GitLab | >=12.1.0<12.1.8 | |
GitLab | >=12.2.0<12.2.3 | |
GitLab | >=12.2.0<12.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15730 is considered a high severity vulnerability due to its SSRF nature which can potentially leak sensitive information.
To fix CVE-2019-15730, upgrade GitLab to version 12.2.3 or later, as this version addresses the SSRF vulnerability.
CVE-2019-15730 affects GitLab Community and Enterprise Editions from versions 8.14 through 12.2.1.
CVE-2019-15730 allows attackers to send unauthorized requests to internal resources, which may result in data exposure.
There is no documented workaround for CVE-2019-15730; the only mitigation is to upgrade to the patched version.