First published: Mon Sep 14 2020(Updated: )
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. Under certain conditions GitLab was not properly revoking user sessions and allowed a malicious user to access a user account with an old password.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <13.1.10 | |
GitLab | >=13.2.0<13.2.8 | |
GitLab | >=13.3.0<13.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13302 has a medium severity level as it can lead to unauthorized access to user accounts.
To fix CVE-2020-13302, upgrade your GitLab installation to versions 13.1.10, 13.2.8, or 13.3.4 or later.
The affected versions for CVE-2020-13302 are all GitLab versions prior to 13.1.10, 13.2.8, and 13.3.4.
CVE-2020-13302 is caused by GitLab failing to properly revoke user sessions, allowing access with old passwords under specific conditions.
If you are running GitLab versions earlier than 13.1.10, 13.2.8, or 13.3.4, then your instance is vulnerable to CVE-2020-13302.