First published: Fri Jun 19 2020(Updated: )
OAuth flow missing verification checks CE/EE 12.3 and later through 13.0.1 allows unverified user to use OAuth authorization code flow
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.3.0<12.9.8 | |
GitLab | >=12.3.0<12.9.8 | |
GitLab | >=12.10.0<12.10.7 | |
GitLab | >=12.10.0<12.10.7 | |
GitLab | =13.0.0 | |
GitLab | =13.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13272 is classified as a high severity vulnerability due to its ability to allow unverified users to exploit OAuth authorization flow.
To fix CVE-2020-13272, upgrade to GitLab version 12.10.8 or later, or 13.0.1 or later.
CVE-2020-13272 affects GitLab Community and Enterprise editions from version 12.3.0 to 12.10.7 and version 13.0.0.
CVE-2020-13272 facilitates an unauthorized OAuth authorization code flow that can lead to account takeover.
CVE-2020-13272 is specific to GitLab and its OAuth implementation in the affected versions.