4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
46.2%
A DOS vulnerability exists in Gitlab CE/EE >=10.3, <13.4.7,>=13.5,
<13.5.5,>=13.6, <13.6.2 that allows an attacker to trigger uncontrolled
resource by bypassing input validation in markdown fields.
about.gitlab.com/releases/2020/12/07/security-release-gitlab-13-6-2-released/
gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-26409.json
gitlab.com/gitlab-org/gitlab/-/issues/259626
hackerone.com/reports/990461
launchpad.net/bugs/cve/CVE-2020-26409
nvd.nist.gov/vuln/detail/CVE-2020-26409
security-tracker.debian.org/tracker/CVE-2020-26409
www.cve.org/CVERecord?id=CVE-2020-26409
4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
46.2%