Lucene search

K
cvelistGitLabCVELIST:CVE-2020-13344
HistoryOct 08, 2020 - 1:43 p.m.

CVE-2020-13344

2020-10-0813:43:02
GitLab
www.cve.org
5
gitlab
redis
plain-text
authentication
session storage

CVSS3

5.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

5.2

Confidence

High

EPSS

0

Percentile

12.6%

An issue has been discovered in GitLab affecting all versions prior to 13.2.10, 13.3.7 and 13.4.2. Sessions keys are stored in plain-text in Redis which allows attacker with Redis access to authenticate as any user that has a session stored in Redis

CNA Affected

[
  {
    "product": "GitLab",
    "vendor": "GitLab",
    "versions": [
      {
        "status": "affected",
        "version": ">=10.8, <13.2.10"
      },
      {
        "status": "affected",
        "version": ">=13.3.0, <13.3.7"
      },
      {
        "status": "affected",
        "version": ">=13.4.0, <13.4.2"
      }
    ]
  }
]

CVSS3

5.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

5.2

Confidence

High

EPSS

0

Percentile

12.6%

Related for CVELIST:CVE-2020-13344