Vulnerability Description
GitLab CE 8.17 and later and EE 8.3 and later have a symlink time-of-check-to-time-of-use race condition that would allow unauthorized access to files in the GitLab Pages chroot environment. This is fixed in versions 11.5.1, 11.4.8, and 11.3.11.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 8.3.0, < 11.3.11 |
Related Weaknesses (CWE)
References
- https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-releaRelease NotesVendor Advisory
- https://gitlab.com/gitlab-org/gitlab-pages/issues/98Issue TrackingVendor Advisory
- https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-releaRelease NotesVendor Advisory
- https://gitlab.com/gitlab-org/gitlab-pages/issues/98Issue TrackingVendor Advisory
FAQ
What is CVE-2018-19572?
CVE-2018-19572 is a vulnerability with a CVSS score of 5.9 (MEDIUM). GitLab CE 8.17 and later and EE 8.3 and later have a symlink time-of-check-to-time-of-use race condition that would allow unauthorized access to files in the GitLab Pages chroot environment. This is f...
How severe is CVE-2018-19572?
CVE-2018-19572 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-19572?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.