First published: Tue Sep 15 2020(Updated: )
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. A user without 2 factor authentication enabled could be prohibited from accessing GitLab by being invited into a project that had 2 factor authentication inheritance.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.1.0<13.1.10 | |
GitLab | >=13.1.0<13.1.10 | |
GitLab | >=13.2.0<13.2.8 | |
GitLab | >=13.2.0<13.2.8 | |
GitLab | >=13.3.0<13.3.4 | |
GitLab | >=13.3.0<13.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13308 is classified as a medium severity vulnerability.
To fix CVE-2020-13308, upgrade GitLab to versions 13.1.10, 13.2.8, or 13.3.4 or later.
Users of GitLab versions before 13.1.10, 13.2.8, or 13.3.4 without two-factor authentication enabled are affected by CVE-2020-13308.
The impact of CVE-2020-13308 is that it can prohibit non-2FA users from accessing GitLab when invited to certain projects.
GitLab community and enterprise versions prior to 13.1.10, 13.2.8, and 13.3.4 are vulnerable to CVE-2020-13308.