CVE-2019-12825

Unauthorized Access to the Container Registry of other groups was discovered in GitLab Enterprise 12.0.0-pre. In other words, authenticated remote attackers can read Docker registries of other groups. When a legitimate user changes the path of a group, Docker registries are not adapted, leaving them in the old namespace. They are not protected and are available to all other users with no previous access to the repo.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:12.0.0:-:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:12.0.0:pre:*:*:enterprise:*:*:*

History

21 Nov 2024, 04:23

Type Values Removed Values Added
References () https://about.gitlab.com/blog/categories/releases/ - Release Notes, Vendor Advisory () https://about.gitlab.com/blog/categories/releases/ - Release Notes, Vendor Advisory
References () https://atomic111.github.io/article/gitlab-Unauthorized-Access-to-Container-Registry - Third Party Advisory () https://atomic111.github.io/article/gitlab-Unauthorized-Access-to-Container-Registry - Third Party Advisory

Information

Published : 2020-02-17 14:15

Updated : 2024-11-21 04:23


NVD link : CVE-2019-12825

Mitre link : CVE-2019-12825

CVE.ORG link : CVE-2019-12825


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-922

Insecure Storage of Sensitive Information