CVE-2019-12430

An issue was discovered in GitLab Community and Enterprise Edition 11.11. A specially crafted payload would allow an authenticated malicious user to execute commands remotely through the repository download feature. It allows Command Injection.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:11.11.0:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:11.11.0:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 04:22

Type Values Removed Values Added
References () https://about.gitlab.com/blog/categories/releases/ - Release Notes, Vendor Advisory () https://about.gitlab.com/blog/categories/releases/ - Release Notes, Vendor Advisory
References () https://about.gitlab.com/releases/2019/06/03/security-release-gitlab-11-dot-11-dot-1-released/ - Release Notes, Vendor Advisory () https://about.gitlab.com/releases/2019/06/03/security-release-gitlab-11-dot-11-dot-1-released/ - Release Notes, Vendor Advisory

Information

Published : 2020-03-10 14:15

Updated : 2024-11-21 04:22


NVD link : CVE-2019-12430

Mitre link : CVE-2019-12430

CVE.ORG link : CVE-2019-12430


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')