First published: Mon Sep 09 2019(Updated: )
An issue was discovered in GitLab Enterprise Edition 10.x (starting in 10.6) and 11.x before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It has Incorrect Access Control. The merge request approvers section has an access control issue that permits project maintainers to view membership of private groups.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.6.0<=10.8.7 | |
GitLab | >=10.6.0<=10.8.7 | |
GitLab | >=11.0.0<11.5.8 | |
GitLab | >=11.0.0<11.5.8 | |
GitLab | >=11.6.0<11.6.6 | |
GitLab | >=11.6.0<11.6.6 | |
GitLab | >=11.7.0<11.7.1 | |
GitLab | >=11.7.0<11.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6996 is rated as a medium severity vulnerability due to its incorrect access control that allows project maintainers to view restricted information.
To fix CVE-2019-6996, upgrade your GitLab instance to version 11.5.8 or later.
CVE-2019-6996 affects GitLab Enterprise Edition versions 10.x (starting from 10.6) and 11.x before 11.5.8, along with specific ranges up to 11.7.1.
CVE-2019-6996 is classified as an Incorrect Access Control vulnerability.
CVE-2019-6996 compromises the merge request approvers section by allowing unauthorized visibility of project membership.