Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
Added |
CVSS V2 |
|
NIST (AV:N/AC:M/Au:S/C:N/I:P/A:N)
|
Added |
CWE |
|
CWE-79
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* versions from (including) 11.11.0 up to (excluding) 11.11.7
*cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:* versions from (including) 11.11.0 up to (excluding) 11.11.7
*cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* versions from (including) 12.0.0 up to (excluding) 12.0.4
*cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:* versions from (including) 12.0.0 up to (excluding) 12.0.4
*cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* versions from (including) 12.1.0 up to (excluding) 12.1.2
*cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:* versions from (including) 12.1.0 up to (excluding) 12.1.2
|
Added |
Reference |
|
https://about.gitlab.com/2019/07/29/security-release-gitlab-12-dot-1-dot-2-released/ [Vendor Advisory]
|
Changed |
Reference Type |
https://gitlab.com/gitlab-org/gitlab-ee/issues/11515 No Types Assigned
|
https://gitlab.com/gitlab-org/gitlab-ee/issues/11515 Exploit, Vendor Advisory
|
Changed |
Reference Type |
https://hackerone.com/reports/496973 No Types Assigned
|
https://hackerone.com/reports/496973 Exploit, Third Party Advisory
|
Added |
CVSS V2 Metadata |
|
Victim must voluntarily interact with attack mechanism
|