Unauthorized Access to the Container Registry of other groups was discovered in GitLab Enterprise 12.0.0-pre. In other words, authenticated remote attackers can read Docker registries of other groups. When a legitimate user changes the path of a group, Docker registries are not adapted, leaving them in the old namespace. They are not protected and are available to all other users with no previous access to the repo.
References
Link | Resource |
---|---|
https://about.gitlab.com/blog/categories/releases/ | Release Notes Vendor Advisory |
https://atomic111.github.io/article/gitlab-Unauthorized-Access-to-Container-Registry | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-02-17T13:54:59
Updated: 2020-02-17T13:54:59
Reserved: 2019-06-14T00:00:00
Link: CVE-2019-12825
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-02-17T14:15:11.810
Modified: 2020-02-28T19:52:26.583
Link: CVE-2019-12825
JSON object: View
Redhat Information
No data.
CWE