
Cloud Vulnerability DB
A community-led vulnerabilities database
GitLab Enterprise Edition (EE) versions 8.9 and later through 12.7.2 contained a security vulnerability related to user permissions validation in the ProjectExportWorker functionality. The vulnerability was discovered and disclosed in January 2020, with CVE-2020-8114 being assigned to track this security issue (GitLab Security Release).
The vulnerability stemmed from a failure to validate user permissions in the ProjectExportWorker when users scheduled project exports. When a user scheduled an export but subsequently lost access to the project before the export process began, the system would still process the export request, bypassing the intended access controls (GitLab Issue).
This vulnerability could allow users who had lost access to projects to continue accessing project data through previously scheduled exports. More critically, blocked users could potentially trigger repeated exports, which could lead to system degradation and potentially cause full system outages (GitLab Issue).
GitLab addressed this vulnerability in versions 12.7.4, 12.6.6, and 12.5.9. The recommended mitigation is to upgrade to these or later versions as soon as possible. GitLab strongly recommended that all installations running affected versions should be upgraded to the latest version (GitLab Security Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."