First published: Tue Nov 17 2020(Updated: )
Certain SAST CiConfiguration information could be viewed by unauthorized users in GitLab EE starting with 13.3. This information was exposed through GraphQL to non-members of public projects with repository visibility restricted as well as guest members on private projects. Affected versions are: >=13.3, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.3.0<13.3.9 | |
GitLab | >=13.3.0<13.3.9 | |
GitLab | >=13.4.0<13.4.5 | |
GitLab | >=13.4.0<13.4.5 | |
GitLab | >=13.5.0<13.5.2 | |
GitLab | >=13.5.0<13.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26406 is classified as a medium severity vulnerability.
To fix CVE-2020-26406, upgrade GitLab to the latest version available beyond 13.5.2.
CVE-2020-26406 affects GitLab EE users running versions from 13.3.0 to 13.5.2.
CVE-2020-26406 allows unauthorized users to view certain SAST CiConfiguration information through GraphQL.
CVE-2020-26406 can expose sensitive project information to non-members of public projects and guest members of private projects.