
Cloud Vulnerability DB
A community-led vulnerabilities database
GitLab Enterprise Edition (EE) versions 8.8 and later through 12.7.2 contained a vulnerability related to insecure permissions. The vulnerability was discovered and disclosed in January 2020, affecting the pipeline status management functionality in GitLab EE (GitLab Release, CVE Mitre).
Under certain conditions, a developer of a project could change the pipeline status of a protected branch to any arbitrary value, bypassing intended security controls. The vulnerability has been assigned a CVSS v3.1 score of 5.3 (MEDIUM) and CVSS v2.0 score of 4.3 (MEDIUM), indicating moderate severity (NVD Results).
The vulnerability could allow developers to manipulate pipeline statuses on protected branches, potentially compromising the integrity of the CI/CD process and bypassing established security controls (GitLab Release).
The vulnerability was addressed in GitLab versions 12.7.4, 12.6.6, and 12.5.9. GitLab strongly recommended that all installations running affected versions be upgraded to the latest version as soon as possible (GitLab Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."