
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in GitLab Community and Enterprise Edition versions 6.8 through 11.11, where users could bypass the mandatory external authentication provider sign-in restrictions by sending a specially crafted request. This vulnerability was assigned CVE-2019-12428 and was disclosed on May 28, 2019 (CVE Mitre, GitLab Release).
The vulnerability is classified as an Improper Authorization issue that allowed users to circumvent mandatory external authentication provider sign-in restrictions through specially crafted requests. The vulnerability affected both Community and Enterprise editions of GitLab (NVD).
The vulnerability could allow unauthorized users to bypass authentication restrictions, potentially compromising the security of GitLab installations by circumventing mandatory external authentication requirements (GitLab Release).
GitLab addressed this vulnerability in versions 11.11.1, 11.10.5, and 11.9.12 for both Community Edition (CE) and Enterprise Edition (EE). It is strongly recommended that all installations running affected versions be upgraded to the latest version immediately (GitLab Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."