SB2019091635 - Multiple vulnerabilities in GitLab, Gitlab Community Edition



SB2019091635 - Multiple vulnerabilities in GitLab, Gitlab Community Edition

Published: September 16, 2019 Updated: July 17, 2020

Security Bulletin ID SB2019091635
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 16
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 81% Low 19%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 16 vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2019-15729)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

An issue was discovered in GitLab Community and Enterprise Edition 8.18 through 12.2.1. An internal endpoint unintentionally disclosed information about the last pipeline that ran for a merge request.


2) Information disclosure (CVE-ID: CVE-2019-15734)

The vulnerability allows a remote authenticated user to gain access to sensitive information.

An issue was discovered in GitLab Community and Enterprise Edition 8.6 through 12.2.1. Under very specific conditions, commit titles and team member comments could become viewable to users who did not have permission to access these.


3) Resource exhaustion (CVE-ID: CVE-2019-15736)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

An issue was discovered in GitLab Community and Enterprise Edition through 12.2.1. Under certain circumstances, CI pipelines could potentially be used in a denial of service attack.


4) Improper Authentication (CVE-ID: CVE-2019-15737)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

An issue was discovered in GitLab Community and Enterprise Edition through 12.2.1. Certain account actions needed improved authentication and session management.


5) Information disclosure (CVE-ID: CVE-2019-15738)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

An issue was discovered in GitLab Community and Enterprise Edition 12.0 through 12.2.1. Under certain conditions, merge request IDs were being disclosed via email.


6) Cross-site scripting (CVE-ID: CVE-2019-15739)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

An issue was discovered in GitLab Community and Enterprise Edition 8.1 through 12.2.1. Certain areas displaying Markdown were not properly sanitizing some XSS payloads.


7) Information disclosure (CVE-ID: CVE-2019-15740)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

An issue was discovered in GitLab Community and Enterprise Edition 7.9 through 12.2.1. EXIF Geolocation data was not being removed from certain image uploads.


8) Incorrect permission assignment for critical resource (CVE-ID: CVE-2019-15721)

The vulnerability allows a remote authenticated user to read and manipulate data.

An issue was discovered in GitLab Community and Enterprise Edition 10.8 through 12.2.1. An internal endpoint unintentionally allowed group maintainers to view and edit group runner settings.


9) Resource exhaustion (CVE-ID: CVE-2019-15722)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

An issue was discovered in GitLab Community and Enterprise Edition 8.15 through 12.2.1. Particular mathematical expressions in GitLab Markdown can exhaust client resources.


10) Improper Neutralization of Special Elements in Output Used by a Downstream Component (CVE-ID: CVE-2019-15724)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

An issue was discovered in GitLab Community and Enterprise Edition 11.10 through 12.2.1. Label descriptions are vulnerable to HTML injection.


11) Information disclosure (CVE-ID: CVE-2019-15725)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

An issue was discovered in GitLab Community and Enterprise Edition 12.0 through 12.2.1. An IDOR in the epic notes API that could result in disclosure of private milestones, labels, and other information.


12) Information disclosure (CVE-ID: CVE-2019-15726)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

An issue was discovered in GitLab Community and Enterprise Edition through 12.2.1. Embedded images and media files in markdown could be pointed to an arbitrary server, which would reveal the IP address of clients requesting the file from that server.


13) Information disclosure (CVE-ID: CVE-2019-15727)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

An issue was discovered in GitLab Community and Enterprise Edition 11.2 through 12.2.1. Insufficient permission checks were being applied when displaying CI results, potentially exposing some CI metrics data to unauthorized users.


14) Incorrect permission assignment for critical resource (CVE-ID: CVE-2019-15731)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

An issue was discovered in GitLab Community and Enterprise Edition 12.0 through 12.2.1. Non-members were able to comment on merge requests despite the repository being set to allow only project members to do so.


15) Information disclosure (CVE-ID: CVE-2019-15732)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

An issue was discovered in GitLab Community and Enterprise Edition 12.2 through 12.2.1. The project import API could be used to bypass project visibility restrictions.


16) Information disclosure (CVE-ID: CVE-2019-15733)

The vulnerability allows a remote authenticated user to gain access to sensitive information.

An issue was discovered in GitLab Community and Enterprise Edition 7.12 through 12.2.1. The specified default branch name could be exposed to unauthorized users.


Remediation

Install update from vendor's website.