CVE-2018-17449

An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. Remote attackers could obtain sensitive information about issues, comments, and project titles via events API insecure direct object reference.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:11.3.0:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:11.3.0:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 03:54

Type Values Removed Values Added
References () https://about.gitlab.com/blog/categories/releases/ - Release Notes () https://about.gitlab.com/blog/categories/releases/ - Release Notes
References () https://about.gitlab.com/releases/2018/10/01/security-release-gitlab-11-dot-3-dot-1-released/ - Release Notes, Vendor Advisory () https://about.gitlab.com/releases/2018/10/01/security-release-gitlab-11-dot-3-dot-1-released/ - Release Notes, Vendor Advisory

Information

Published : 2023-04-15 23:15

Updated : 2024-11-21 03:54


NVD link : CVE-2018-17449

Mitre link : CVE-2018-17449

CVE.ORG link : CVE-2018-17449


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-639

Authorization Bypass Through User-Controlled Key