CVE-2019-15578

An information disclosure exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE). The path of a private project, that used to be public, would be disclosed in the unsubscribe email link of issues and merge requests.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 04:29

Type Values Removed Values Added
References () https://about.gitlab.com/blog/2019/09/30/security-release-gitlab-12-dot-3-dot-2-released/ - Vendor Advisory () https://about.gitlab.com/blog/2019/09/30/security-release-gitlab-12-dot-3-dot-2-released/ - Vendor Advisory
References () https://hackerone.com/reports/650574 - Permissions Required () https://hackerone.com/reports/650574 - Permissions Required

Information

Published : 2020-01-28 03:15

Updated : 2024-11-21 04:29


NVD link : CVE-2019-15578

Mitre link : CVE-2019-15578

CVE.ORG link : CVE-2019-15578


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor