CVE-2019-15726

Source
https://cve.org/CVERecord?id=CVE-2019-15726
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-15726.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-15726
Downstream
Related
Published
2019-09-16T17:15:13.697Z
Modified
2026-03-13T00:42:18.634079Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in GitLab Community and Enterprise Edition through 12.2.1. Embedded images and media files in markdown could be pointed to an arbitrary server, which would reveal the IP address of clients requesting the file from that server.

References

Affected packages

Git / gitlab.com/gitlab-org/gitlab

Affected ranges

Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "12.0.8"
        },
        {
            "introduced": "0"
        },
        {
            "fixed": "12.0.8"
        },
        {
            "introduced": "12.1.0"
        },
        {
            "fixed": "12.1.8"
        },
        {
            "introduced": "12.1.0"
        },
        {
            "fixed": "12.1.8"
        },
        {
            "introduced": "12.2.0"
        },
        {
            "fixed": "12.2.3"
        },
        {
            "introduced": "12.2.0"
        },
        {
            "fixed": "12.2.3"
        }
    ]
}

Affected versions

v12.*
v12.1.0-ee
v12.1.1-ee
v12.1.2-ee
v12.1.3-ee
v12.1.4-ee
v12.1.6-ee
v12.2.0-ee
v12.2.1-ee

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-15726.json"