
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in GitLab Enterprise Edition versions 10.6 through 12.0.2 related to GitHub project integration. The vulnerability was identified and disclosed in July 2019, affecting the GitHub project integration feature. The issue was assigned CVE-2019-13121 (GitLab Release, NVD).
The vulnerability was classified as a Server-Side Request Forgery (SSRF) with incorrect access control. It received a CVSS v3.1 Base Score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N. The vulnerability was also assessed under CVSS v2.0 with a Base Score of 5.0 (MEDIUM) and vector (AV:N/AC:L/Au:N/C:N/I:P/A:N) (NVD).
The vulnerability allowed attackers to make unauthorized requests to local network resources through the GitHub project integration feature, potentially compromising internal systems and services (NVD).
The vulnerability was patched in GitLab version 12.0.3. Users were strongly recommended to upgrade their GitLab installations to the fixed version immediately (GitLab Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."