First published: Thu Mar 12 2020(Updated: )
GitLab 12.8.x before 12.8.6, when sign-up is enabled, allows remote attackers to bypass email domain restrictions within the two-day grace period for an unconfirmed email address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.8.0<12.8.6 | |
GitLab | >=12.8.0<12.8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10535 has a medium severity rating due to its potential to allow unauthorized access during a specific grace period.
To fix CVE-2020-10535, upgrade GitLab to version 12.8.6 or later immediately to close the vulnerability.
CVE-2020-10535 affects GitLab versions 12.8.0 to 12.8.5 for both Community and Enterprise editions.
The impact of CVE-2020-10535 allows attackers to bypass email domain restrictions if sign-up is enabled.
There is no official workaround for CVE-2020-10535, so upgrading to the patched version is recommended.