First published: Mon Sep 14 2020(Updated: )
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab OAuth endpoint was vulnerable to brute-force attacks through a specific parameter.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.1.0<13.1.10 | |
GitLab | >=13.1.0<13.1.10 | |
GitLab | >=13.2.0<13.2.8 | |
GitLab | >=13.2.0<13.2.8 | |
GitLab | >=13.3.0<13.3.4 | |
GitLab | >=13.3.0<13.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13312 has a medium severity rating due to its potential for brute-force attacks on the GitLab OAuth endpoint.
To fix CVE-2020-13312, upgrade GitLab to versions 13.1.10, 13.2.8, or 13.3.4 or later.
CVE-2020-13312 affects GitLab versions before 13.1.10, 13.2.8, and 13.3.4.
Yes, CVE-2020-13312 can be exploited remotely if an attacker targets the OAuth endpoint.
CVE-2020-13312 enables brute-force attacks against the GitLab OAuth endpoint.