First published: Tue Nov 17 2020(Updated: )
Path traversal vulnerability in package upload functionality in GitLab CE/EE starting from 12.8 allows an attacker to save packages in arbitrary locations. Affected versions are >=12.8, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.8.0<13.3.9 | |
GitLab | >=12.8.0<13.3.9 | |
GitLab | >=13.4.0<13.4.5 | |
GitLab | >=13.4.0<13.4.5 | |
GitLab | >=13.5.0<13.5.2 | |
GitLab | >=13.5.0<13.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26405 has a moderate severity level as it allows unauthorized file storage in arbitrary locations.
To remediate CVE-2020-26405, upgrade GitLab to versions 13.3.9 or later, or 13.4.5 or later, or 13.5.2 or later.
CVE-2020-26405 affects GitLab versions from 12.8 to 13.3.9 and includes various versions of 13.4 and 13.5.
A path traversal vulnerability in CVE-2020-26405 allows an attacker to manipulate file paths to store files outside intended directories.
Yes, CVE-2020-26405 affects both GitLab Community Edition and GitLab Enterprise Edition.