First published: Fri May 17 2019(Updated: )
An Incorrect Access Control issue was discovered in GitLab Community and Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. The GitLab API allowed project Maintainers and Owners to view the trigger tokens of other project users.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.12.0<11.5.8 | |
GitLab | >=8.12.0<11.5.8 | |
GitLab | >=11.6.0<11.6.6 | |
GitLab | >=11.6.0<11.6.6 | |
GitLab | >=11.7.0<11.7.1 | |
GitLab | >=11.7.0<11.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6787 has a medium severity level due to the potential exposure of sensitive trigger tokens.
To fix CVE-2019-6787, upgrade GitLab to version 11.5.8, 11.6.6, or 11.7.1 or newer.
CVE-2019-6787 affects GitLab Community and Enterprise Editions prior to versions 11.5.8, 11.6.6, and 11.7.1.
Project Maintainers and Owners in GitLab can be impacted by CVE-2019-6787 as they can view the trigger tokens of other users.
CVE-2019-6787 is categorized as an Incorrect Access Control vulnerability.