First published: Wed Apr 17 2019(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It allows SSRF.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <11.6.10 | |
GitLab | <11.6.10 | |
GitLab | >=11.7.0<11.7.6 | |
GitLab | >=11.7.0<11.7.6 | |
GitLab | >=11.8.0<11.8.1 | |
GitLab | >=11.8.0<11.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9174 has a medium severity as it allows for server-side request forgery (SSRF) exploitation.
To fix CVE-2019-9174, update GitLab Community or Enterprise Edition to version 11.6.10, 11.7.6, or 11.8.1 or later.
CVE-2019-9174 affects GitLab versions prior to 11.6.10, between 11.7.0 and 11.7.6, and between 11.8.0 and 11.8.1.
CVE-2019-9174 can potentially allow attackers to manipulate requests sent to internal systems by exploiting SSRF vulnerabilities.
CVE-2019-9174 is considered a remote vulnerability as it can be exploited over the network.