First published: Tue Sep 15 2020(Updated: )
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was not revoking current user sessions when 2 factor authentication was activated allowing a malicious user to maintain their access.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.1.0<13.1.10 | |
GitLab | >=13.1.0<13.1.10 | |
GitLab | >=13.2.0<13.2.8 | |
GitLab | >=13.2.0<13.2.8 | |
GitLab | >=13.3.0<13.3.4 | |
GitLab | >=13.3.0<13.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13307 has been classified with a high severity due to the potential for malicious users to maintain unauthorized access.
To fix CVE-2020-13307, upgrade GitLab to version 13.1.10, 13.2.8, or 13.3.4 or later.
CVE-2020-13307 affects all affected GitLab Community and Enterprise editions prior to versions 13.1.10, 13.2.8, and 13.3.4.
The impact of CVE-2020-13307 allows attackers to maintain access by not revoking user sessions when two-factor authentication is enabled.
There are no documented workarounds for CVE-2020-13307; upgrading to a patched version is required.