First published: Fri Jan 03 2020(Updated: )
GitLab Enterprise Edition (EE) 6.7 and later through 12.5 allows SSRF.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=6.7.0<12.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19261 is classified as a high severity vulnerability due to its potential for SSRF attacks.
To fix CVE-2019-19261, upgrade GitLab Enterprise Edition to version 12.5.1 or later.
CVE-2019-19261 affects GitLab Enterprise Edition versions 6.7 through 12.5.
In the context of CVE-2019-19261, SSRF refers to Server-Side Request Forgery, which allows an attacker to send crafted requests from the server.
Yes, CVE-2019-19261 can potentially be exploited remotely if the vulnerable GitLab server is accessible.