In GitLab EE 11.3 through 12.5.3, 12.4.5, and 12.3.8, insufficient parameter sanitization for the Maven package registry could lead to privilege escalation and remote code execution vulnerabilities under certain conditions.
References
Link | Resource |
---|---|
https://about.gitlab.com/blog/2019/12/10/critical-security-release-gitlab-12-5-4-released/ | Vendor Advisory |
https://about.gitlab.com/blog/categories/releases/ | Release Notes |
https://about.gitlab.com/blog/2019/12/10/critical-security-release-gitlab-12-5-4-released/ | Vendor Advisory |
https://about.gitlab.com/blog/categories/releases/ | Release Notes |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://about.gitlab.com/blog/2019/12/10/critical-security-release-gitlab-12-5-4-released/ - Vendor Advisory | |
References | () https://about.gitlab.com/blog/categories/releases/ - Release Notes |
Information
Published : 2020-01-05 22:15
Updated : 2024-11-21 04:35
NVD link : CVE-2019-19628
Mitre link : CVE-2019-19628
CVE.ORG link : CVE-2019-19628
JSON object : View
Products Affected
gitlab
- gitlab
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')