First published: Tue Sep 29 2020(Updated: )
A vulnerability was discovered in GitLab versions after 12.9. Due to improper verification of permissions, an unauthorized user can create and delete deploy tokens.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.9.0<12.10.13 | |
GitLab | >=13.0.0<13.0.8 | |
GitLab | >=13.1.0<13.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13322 has a severity rating of medium due to its potential for unauthorized access.
To fix CVE-2020-13322, upgrade GitLab to version 12.10.13 or later, or to version 13.0.8 or later, or to version 13.1.2 or later.
CVE-2020-13322 affects GitLab versions from 12.9.0 to 12.10.13, 13.0.0 to 13.0.8, and 13.1.0 to 13.1.2.
CVE-2020-13322 is a permission verification vulnerability that allows unauthorized users to manage deploy tokens.
Yes, CVE-2020-13322 can lead to data breaches if an unauthorized user exploits the vulnerability to control deploy tokens.