Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.
From VID-4091069E-860B-11E9-A05F-001B217B3468:
Gitlab reports:
Remote Command Execution Vulnerability on Repository Download Feature
Confidential Issue Titles Revealed to Restricted Users on Unsubscribe
Disclosure of Milestone Metadata through the Search API
Private Project Discovery via Comment Links
Metadata of Confidential Issues Disclosed to Restricted Users
Mandatory External Authentication Provider Sign-In Restrictions Bypass
Internal Projects Allowed to Be Created on in Private Groups
Server-Side Request Forgery Through DNS Rebinding
Stored Cross-Site Scripting on Wiki Pages
Stored Cross-Site Scripting on Notes
Repository Password Disclosed on Import Error Page
Protected Branches Restriction Rules Bypass
Stored Cross-Site Scripting Vulnerability on Child Epics
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center