First published: Thu Aug 13 2020(Updated: )
For GitLab before 13.0.12, 13.1.6, 13.2.3 user controlled git configuration settings can be modified to result in Server Side Request Forgery.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.7.0<13.0.12 | |
GitLab | >=12.7.0<13.0.12 | |
GitLab | >=13.1.0<13.1.6 | |
GitLab | >=13.1.0<13.1.6 | |
GitLab | >=13.2.0<13.2.3 | |
GitLab | >=13.2.0<13.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13286 has a CVSS score indicating it is a high severity vulnerability due to its potential for Server Side Request Forgery.
Fix CVE-2020-13286 by upgrading GitLab to version 13.0.12, 13.1.6, or 13.2.3 or later.
The impact of CVE-2020-13286 allows attackers to manipulate git configuration settings, leading to unauthorized requests to internal services.
CVE-2020-13286 affects GitLab versions prior to 13.0.12, 13.1.6, and 13.2.3 for both community and enterprise editions.
Users running affected versions of GitLab, both community and enterprise, are at risk from CVE-2020-13286.