
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. Remote attackers could obtain sensitive information about issues, comments, and project titles via events API insecure direct object reference (GitLab Release, NVD).
The vulnerability is classified as an insecure direct object reference issue in the events API, which could lead to unauthorized access to confidential information. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating a network-exploitable vulnerability with low attack complexity and no required privileges or user interaction (NVD).
The vulnerability allows unauthorized access to confidential issues, comments, and titles of public projects through the events API. This information disclosure could potentially expose sensitive project data to unauthorized users (GitLab Release).
Users are strongly recommended to upgrade to GitLab versions 11.3.1, 11.2.4, or 11.1.7 immediately. Note that version 11.1.7 was initially vulnerable due to a mistake in tagging the release, and users should upgrade to 11.1.8 instead (GitLab Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."