Vulnerability Description
An issue was discovered in GitLab Community and Enterprise Edition 9.x, 10.x, and 11.x before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It has Incorrect Access Control. Access to the internal wiki is permitted when an external wiki service is enabled.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 9.3.0, <= 9.3.7 |
References
- https://about.gitlab.com/2019/01/31/security-release-gitlab-11-dot-7-dot-3-releaRelease NotesVendor Advisory
- https://gitlab.com/gitlab-org/gitlab-ce/issues/54357ExploitIssue TrackingThird Party Advisory
- https://about.gitlab.com/2019/01/31/security-release-gitlab-11-dot-7-dot-3-releaRelease NotesVendor Advisory
- https://gitlab.com/gitlab-org/gitlab-ce/issues/54357ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2019-6960?
CVE-2019-6960 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in GitLab Community and Enterprise Edition 9.x, 10.x, and 11.x before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It has Incorrect Access Control. Access to the int...
How severe is CVE-2019-6960?
CVE-2019-6960 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-6960?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.