First published: Fri Jun 19 2020(Updated: )
An authorization issue relating to project maintainer impersonation was identified in GitLab EE 9.5 and later through 13.0.1 that could allow unauthorized users to impersonate as a maintainer to perform limited actions.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=9.5.0<12.9.8 | |
GitLab | >=9.5.0<12.9.8 | |
GitLab | >=12.10.0<12.10.7 | |
GitLab | >=12.10.0<12.10.7 | |
GitLab | =13.0.0 | |
GitLab | =13.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13263 has been rated with a medium severity due to its potential for unauthorized maintainer impersonation.
To fix CVE-2020-13263, upgrade to GitLab versions 12.10.8, 12.9.9, or any version beyond 13.0.1.
CVE-2020-13263 affects GitLab EE versions from 9.5 to 12.9.8 and versions from 12.10.0 to 12.10.7 and 13.0.0.
CVE-2020-13263 is classified as an authorization vulnerability related to maintainer impersonation.
Users of GitLab EE and CE running vulnerable versions may be impacted by CVE-2020-13263 due to the risk of unauthorized actions being performed.