Unauthorized Access to the Container Registry of other groups was discovered in GitLab Enterprise 12.0.0-pre. In other words, authenticated remote attackers can read Docker registries of other groups. When a legitimate user changes the path of a group, Docker registries are not adapted, leaving them in the old namespace. They are not protected and are available to all other users with no previous access to the repo.
References
Link | Resource |
---|---|
https://about.gitlab.com/blog/categories/releases/ | Release Notes Vendor Advisory |
https://atomic111.github.io/article/gitlab-Unauthorized-Access-to-Container-Registry | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-02-17 06:15
Updated : 2020-02-28 11:52
NVD link : CVE-2019-12825
Mitre link : CVE-2019-12825
JSON object : View
CWE
CWE-922
Insecure Storage of Sensitive Information
Products Affected
gitlab
- gitlab