{"id":"CVE-2019-12430","details":"An issue was discovered in GitLab Community and Enterprise Edition 11.11. A specially crafted payload would allow an authenticated malicious user to execute commands remotely through the repository download feature. It allows Command Injection.","modified":"2026-04-09T06:24:18.060241Z","published":"2020-03-10T14:15:11.660Z","references":[{"type":"ADVISORY","url":"https://about.gitlab.com/blog/categories/releases/"},{"type":"ADVISORY","url":"https://about.gitlab.com/releases/2019/06/03/security-release-gitlab-11-dot-11-dot-1-released/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"0"},{"last_affected":"deb6f84e91fe4d21daa6b5558c517254ea2668a3"},{"introduced":"0"},{"last_affected":"deb6f84e91fe4d21daa6b5558c517254ea2668a3"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"11.11.0"},{"introduced":"0"},{"last_affected":"11.11.0"}]}}],"versions":["11-10-0cfa69752d8-0d9531c80-ee","11-10-0cfa69752d8-74ffd66ae-ee","11-10-119f9509d50-6d7537235-ee","v1.2.0","v1.2.0pre","v1.2.1","v1.2.2","v11.11.0-ee","v11.11.0-rc1-ee","v11.11.0-rc2-ee","v11.11.0-rc3-ee","v11.11.0-rc4-ee","v11.11.0-rc5-ee","v2.3.0","v2.3.0pre","v2.3.1","v2.4.0","v2.4.0pre","v2.4.1","v2.5.0","v2.6.0","v2.6.0pre","v2.6.1","v2.6.2","v2.6.3","v2.7.0","v2.7.0pre","v2.8.0","v2.8.0pre","v2.8.1","v2.8.2","v2.9.0","v2.9.1","v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.1.0","v4.0.0","v4.0.0rc1","v4.0.0rc2","v5.0.0","v5.1.0","v5.2.0","v6.0.0-ee","v6.0.0-ee.beta","v6.0.0-ee.rc1","v6.1.0-ee","v6.3.0-ee","v6.3.1-ee","v6.4.0-ee","v6.5.0-ee","v6.6.0-ee","v6.7.0-ee","v6.7.0.rc1-ee","v6.8.0-ee","v7.0.0-ee","v7.1.0-ee","v7.1.0.rc1-ee","v7.2.0.rc1-ee","v7.2.0.rc2-ee","v7.2.0.rc3-ee","v7.2.0.rc4-ee","v7.2.0.rc5-ee","v7.3.0-ee","v7.3.0.rc1-ee"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-12430.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}