First published: Wed Jun 10 2020(Updated: )
Missing permission check on fork relation creation in GitLab CE/EE 11.3 and later through 13.0.1 allows guest users to create a fork relation on restricted public projects via API
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.3.0<11.9.8 | |
GitLab | >=11.3.0<12.9.8 | |
GitLab | >=12.10.0<12.10.7 | |
GitLab | >=12.10.0<12.10.7 | |
GitLab | >=13.0.0<13.0.1 | |
GitLab | >=13.0.0<13.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13270 is classified as a medium severity vulnerability.
To fix CVE-2020-13270, you should upgrade GitLab to the latest version that addresses this vulnerability.
CVE-2020-13270 affects GitLab Community and Enterprise Editions from version 11.3 through 13.0.1.
CVE-2020-13270 allows unauthorized guest users to create fork relations on restricted public projects via the API.
CVE-2020-13270 was disclosed in 2020.