First published: Sun Jan 05 2020(Updated: )
In GitLab EE 11.3 through 12.5.3, 12.4.5, and 12.3.8, insufficient parameter sanitization for the Maven package registry could lead to privilege escalation and remote code execution vulnerabilities under certain conditions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.3.0<=12.3.8 | |
GitLab | >=12.4.0<=12.4.5 | |
GitLab | >=12.5.0<=12.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19628 has a high severity level due to its potential for privilege escalation and remote code execution.
To fix CVE-2019-19628, update GitLab to a version later than 12.5.4.
CVE-2019-19628 affects GitLab EE versions from 11.3.0 up to 12.5.3, 12.4.5, and 12.3.8.
Insufficient parameter sanitization in CVE-2019-19628 can lead to privilege escalation and remote code execution vulnerabilities.
CVE-2019-19628 specifically affects the GitLab Enterprise Editions.