First published: Fri May 17 2019(Updated: )
An Incorrect Access Control (issue 2 of 3) issue was discovered in GitLab Community and Enterprise Edition 8.14 and later but before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. Guest users were able to view the list of a group's merge requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.14.0<11.5.8 | |
GitLab | >=8.14.0<11.5.8 | |
GitLab | >=11.6.0<11.6.6 | |
GitLab | >=11.6.0<11.6.6 | |
GitLab | >=11.7.0<11.7.1 | |
GitLab | >=11.7.0<11.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6790 is classified as a medium severity vulnerability due to incorrect access control allowing unauthorized access to merge requests.
To fix CVE-2019-6790, upgrade GitLab to version 11.7.1 or later, or to versions 11.6.6 or later as applicable.
CVE-2019-6790 affects GitLab Community and Enterprise Editions from version 8.14 through 11.5.8, and from 11.6.0 through 11.6.6, and from 11.7.0 through 11.7.1.
CVE-2019-6790 is an Incorrect Access Control vulnerability that allows guest users to view group merge requests.
Upgrade to GitLab Community Edition and Enterprise Edition versions 11.7.1 or later, or 11.6.6 or later to address CVE-2019-6790.