CVE-2019-15580
18.12.2019, 21:15
An information exposure vulnerability exists in gitlab.com <v12.3.2, <v12.2.6, and <v12.1.10 when using the blocking merge request feature, it was possible for an unauthenticated user to see the head pipeline data of a public project even though pipeline visibility was restricted.Enginsight
Vendor | Product | Version |
---|---|---|
gitlab | gitlab | 𝑥 < 12.1.10 |
gitlab | gitlab | 𝑥 < 12.1.10 |
gitlab | gitlab | 12.2.0 ≤ 𝑥 < 12.2.6 |
gitlab | gitlab | 12.2.0 ≤ 𝑥 < 12.2.6 |
gitlab | gitlab | 12.3.0 ≤ 𝑥 < 12.3.2 |
gitlab | gitlab | 12.3.0 ≤ 𝑥 < 12.3.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-201 - Insertion of Sensitive Information Into Sent DataThe code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor.
- CWE-200 - Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.