CVE-2019-19628

In GitLab EE 11.3 through 12.5.3, 12.4.5, and 12.3.8, insufficient parameter sanitization for the Maven package registry could lead to privilege escalation and remote code execution vulnerabilities under certain conditions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 04:35

Type Values Removed Values Added
References () https://about.gitlab.com/blog/2019/12/10/critical-security-release-gitlab-12-5-4-released/ - Vendor Advisory () https://about.gitlab.com/blog/2019/12/10/critical-security-release-gitlab-12-5-4-released/ - Vendor Advisory
References () https://about.gitlab.com/blog/categories/releases/ - Release Notes () https://about.gitlab.com/blog/categories/releases/ - Release Notes

Information

Published : 2020-01-05 22:15

Updated : 2024-11-21 04:35


NVD link : CVE-2019-19628

Mitre link : CVE-2019-19628

CVE.ORG link : CVE-2019-19628


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')