First published: Thu Dec 10 2020(Updated: )
An information leak vulnerability exists in Gerrit versions prior to 2.14.22, 2.15.21, 2.16.25, 3.0.15, 3.1.10, 3.2.5 where an overoptimization with the FilteredRepository wrapper skips the verification of access on All-Users repositories, allowing an attacker to get read access to all users' personal information associated with their accounts.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Gerrit | >=2.14.0<2.14.22 | |
Google Gerrit | >=2.15.0<2.15.21 | |
Google Gerrit | >=2.16.0<2.16.25 | |
Google Gerrit | >=3.0.0<3.0.15 | |
Google Gerrit | >=3.1.0<3.1.10 | |
Google Gerrit | >=3.2.0<3.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8920 has a medium severity rating due to potential unauthorized access to repository data.
To fix CVE-2020-8920, upgrade to Gerrit versions 2.14.22, 2.15.21, 2.16.25, 3.0.15, 3.1.10, or 3.2.5.
CVE-2020-8920 affects users of Gerrit versions prior to 2.14.22, 2.15.21, 2.16.25, 3.0.15, 3.1.10, and 3.2.5.
CVE-2020-8920 is an information leak vulnerability that allows unauthorized read access.
Gerrit versions prior to 2.14.22, 2.15.21, 2.16.25, 3.0.15, 3.1.10, and 3.2.5 are vulnerable to CVE-2020-8920.