First published: Fri Dec 11 2020(Updated: )
An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.1.0<13.4.7 | |
GitLab | >=13.1.0<13.4.7 | |
GitLab | >=13.5.0<13.5.5 | |
GitLab | >=13.5.0<13.5.5 | |
GitLab | >=13.6.0<13.6.2 | |
GitLab | >=13.6.0<13.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13357 has a medium severity level due to unauthorized access vulnerabilities.
To fix CVE-2020-13357, you should upgrade GitLab to version 13.4.7 or later, 13.5.5 or later, or 13.6.2 or later.
CVE-2020-13357 affects GitLab CE/EE versions from 13.1 to below 13.4.7, from 13.5 to below 13.5.5, and from 13.6 to below 13.6.2.
CVE-2020-13357 is a vulnerability that allows unauthorized users to access a user list associated with a feature flag in a project.
Organizations using vulnerable versions of GitLab CE or EE that have enabled certain feature flags may be affected by CVE-2020-13357.