Vulnerability Details : CVE-2019-12428
An issue was discovered in GitLab Community and Enterprise Edition 6.8 through 11.11. Users could bypass the mandatory external authentication provider sign-in restrictions by sending a specially crafted request. It has Improper Authorization.
Products affected by CVE-2019-12428
- Gitlab » Gitlab » Community EditionVersions from including (>=) 6.8.0 and up to, including, (<=) 11.11.0cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
- Gitlab » Gitlab » Enterprise EditionVersions from including (>=) 6.8.0 and up to, including, (<=) 11.11.0cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-12428
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-12428
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
References for CVE-2019-12428
-
https://about.gitlab.com/releases/2019/06/03/security-release-gitlab-11-dot-11-dot-1-released/
GitLab Security Release: 11.11.1, 11.10.5, and 11.9.12 | GitLabRelease Notes;Vendor Advisory
-
https://about.gitlab.com/blog/categories/releases/
Releases | GitLabRelease Notes;Vendor Advisory
Jump to