Vulnerability Details : CVE-2019-12825
Unauthorized Access to the Container Registry of other groups was discovered in GitLab Enterprise 12.0.0-pre. In other words, authenticated remote attackers can read Docker registries of other groups. When a legitimate user changes the path of a group, Docker registries are not adapted, leaving them in the old namespace. They are not protected and are available to all other users with no previous access to the repo.
Vulnerability category: Bypass
Products affected by CVE-2019-12825
- cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
- cpe:2.3:a:gitlab:gitlab:12.0.0:-:*:*:enterprise:*:*:*
- cpe:2.3:a:gitlab:gitlab:12.0.0:pre:*:*:enterprise:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-12825
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-12825
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
2.8
|
1.4
|
NIST |
CWE ids for CVE-2019-12825
-
The product stores sensitive information without properly limiting read or write access by unauthorized actors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-12825
-
https://atomic111.github.io/article/gitlab-Unauthorized-Access-to-Container-Registry
CVE-2019-12825: Unauthorized Access to Container Registry of other groups · Patrick Münch BlogThird Party Advisory
-
https://about.gitlab.com/blog/categories/releases/
Releases | GitLabRelease Notes;Vendor Advisory
Jump to