First published: Mon Sep 09 2019(Updated: )
An input validation problem was discovered in the GitHub service integration which could result in an attacker being able to make arbitrary POST requests in a GitLab instance's internal network. This vulnerability was addressed in 12.1.2, 12.0.4, and 11.11.6.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.11.0<11.11.7 | |
GitLab | >=11.11.0<11.11.7 | |
GitLab | >=12.0.0<12.0.4 | |
GitLab | >=12.0.0<12.0.4 | |
GitLab | >=12.1.0<12.1.2 | |
GitLab | >=12.1.0<12.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-5461 is classified as high due to the potential for attackers to make arbitrary POST requests.
To fix CVE-2019-5461, upgrade your GitLab instance to version 12.1.2, 12.0.4, or 11.11.6 or later.
CVE-2019-5461 affects GitLab versions between 11.11.0 and 11.11.7, 12.0.0 and 12.0.4, and 12.1.0 and 12.1.2.
CVE-2019-5461 is an input validation vulnerability in GitLab that allows unauthorized POST requests within the internal network.
CVE-2019-5461 was addressed in GitLab releases on July 29, 2019.