First published: Wed Aug 12 2020(Updated: )
Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team.
Credit: security@pivotal.io
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software Concourse | <6.3.1 | |
Pivotal Software Concourse | >=6.4.0<6.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5415 is a vulnerability in Concourse versions prior to 6.3.1 and 6.4.1 that affects installations using the GitLab auth connector and allows identity spoofing.
CVE-2020-5415 affects Concourse installations that use the GitLab auth connector and have versions prior to 6.3.1 or 6.4.1.
CVE-2020-5415 has a severity rating of critical with a severity value of 10.
To fix CVE-2020-5415, update Concourse to version 6.3.1 or 6.4.1 if you are using the GitLab auth connector.
You can find more information about CVE-2020-5415 in the official GitHub advisory (https://github.com/concourse/concourse/security/advisories/GHSA-627p-rr78-99rj) and the VMware security advisory (https://tanzu.vmware.com/security/cve-2020-5415).