Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-13309 (GCVE-0-2020-13309)
Vulnerability from cvelistv5 – Published: 2020-09-14 21:36 – Updated: 2024-08-04 12:18
VLAI?
EPSS
Summary
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature.
Severity ?
5.4 (Medium)
CWE
- Server-side request forgery (ssrf) in GitLab
Assigner
References
3 references
| URL | Tags |
|---|---|
| https://gitlab.com/gitlab-org/gitlab/-/issues/215879 | x_refsource_MISC |
| https://hackerone.com/reports/860196 | x_refsource_MISC |
| https://gitlab.com/gitlab-org/cves/-/blob/master/… | x_refsource_CONFIRM |
Impacted products
Credits
Thanks [sky003](https://hackerone.com/sky003) for reporting this vulnerability through our HackerOne bug bounty program
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T12:18:17.002Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/215879"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://hackerone.com/reports/860196"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "GitLab",
"vendor": "GitLab",
"versions": [
{
"status": "affected",
"version": "\u003e=1.0, \u003c13.1.10"
},
{
"status": "affected",
"version": "\u003e=13.2, \u003c13.2.8"
},
{
"status": "affected",
"version": "\u003e=13.3, \u003c13.3.4"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Thanks [sky003](https://hackerone.com/sky003) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Server-side request forgery (ssrf) in GitLab",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-09-14T21:36:54.000Z",
"orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
"shortName": "GitLab"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/215879"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://hackerone.com/reports/860196"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@gitlab.com",
"ID": "CVE-2020-13309",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "GitLab",
"version": {
"version_data": [
{
"version_value": "\u003e=1.0, \u003c13.1.10"
},
{
"version_value": "\u003e=13.2, \u003c13.2.8"
},
{
"version_value": "\u003e=13.3, \u003c13.3.4"
}
]
}
}
]
},
"vendor_name": "GitLab"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Thanks [sky003](https://hackerone.com/sky003) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Server-side request forgery (ssrf) in GitLab"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/215879",
"refsource": "MISC",
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/215879"
},
{
"name": "https://hackerone.com/reports/860196",
"refsource": "MISC",
"url": "https://hackerone.com/reports/860196"
},
{
"name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json",
"refsource": "CONFIRM",
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
"assignerShortName": "GitLab",
"cveId": "CVE-2020-13309",
"datePublished": "2020-09-14T21:36:54.000Z",
"dateReserved": "2020-05-21T00:00:00.000Z",
"dateUpdated": "2024-08-04T12:18:17.002Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2020-13309",
"date": "2026-05-22",
"epss": "0.00233",
"percentile": "0.46151"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"13.1.10\", \"matchCriteriaId\": \"5679F06E-96ED-4A34-AF94-2532C22B465B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.2.0\", \"versionEndExcluding\": \"13.2.8\", \"matchCriteriaId\": \"724E2186-FCF8-4082-9603-06609EFA4157\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.3.0\", \"versionEndExcluding\": \"13.3.4\", \"matchCriteriaId\": \"EBD4843F-FD1E-497A-A95F-B7F4C1B8BDA3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature.\"}, {\"lang\": \"es\", \"value\": \"Se detect\\u00f3 una vulnerabilidad en GitLab versiones anteriores a 13.1.10, 13.2.8 y 13.3.4.\u0026#xa0;GitLab era vulnerable a un ataque de tipo SSRF ciego por medio de la funcionalidad repository mirroring\"}]",
"id": "CVE-2020-13309",
"lastModified": "2024-11-21T05:01:00.230",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cve@gitlab.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.5}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-09-14T22:15:11.287",
"references": "[{\"url\": \"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json\", \"source\": \"cve@gitlab.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://gitlab.com/gitlab-org/gitlab/-/issues/215879\", \"source\": \"cve@gitlab.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://hackerone.com/reports/860196\", \"source\": \"cve@gitlab.com\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://gitlab.com/gitlab-org/gitlab/-/issues/215879\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://hackerone.com/reports/860196\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\"]}]",
"sourceIdentifier": "cve@gitlab.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-918\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-13309\",\"sourceIdentifier\":\"cve@gitlab.com\",\"published\":\"2020-09-14T22:15:11.287\",\"lastModified\":\"2024-11-21T05:01:00.230\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 una vulnerabilidad en GitLab versiones anteriores a 13.1.10, 13.2.8 y 13.3.4.\u0026#xa0;GitLab era vulnerable a un ataque de tipo SSRF ciego por medio de la funcionalidad repository mirroring\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@gitlab.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-918\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.1.10\",\"matchCriteriaId\":\"5679F06E-96ED-4A34-AF94-2532C22B465B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.2.0\",\"versionEndExcluding\":\"13.2.8\",\"matchCriteriaId\":\"724E2186-FCF8-4082-9603-06609EFA4157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.3.0\",\"versionEndExcluding\":\"13.3.4\",\"matchCriteriaId\":\"EBD4843F-FD1E-497A-A95F-B7F4C1B8BDA3\"}]}]}],\"references\":[{\"url\":\"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/gitlab-org/gitlab/-/issues/215879\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hackerone.com/reports/860196\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/gitlab-org/gitlab/-/issues/215879\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hackerone.com/reports/860196\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]}]}}"
}
}
bit-gitlab-2020-13309
Vulnerability from bitnami_vulndb
Published
2024-03-06 11:22
Modified
2025-04-03 14:40
Summary
Details
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "gitlab",
"purl": "pkg:bitnami/gitlab"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "13.1.10"
},
{
"introduced": "13.2.0"
},
{
"fixed": "13.2.8"
},
{
"introduced": "13.3.0"
},
{
"fixed": "13.3.4"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2020-13309"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
],
"severity": "High"
},
"details": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature.",
"id": "BIT-gitlab-2020-13309",
"modified": "2025-04-03T14:40:37.652Z",
"published": "2024-03-06T11:22:24.941Z",
"references": [
{
"type": "WEB",
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json"
},
{
"type": "WEB",
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/215879"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/860196"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13309"
}
],
"schema_version": "1.5.0"
}
CNVD-2020-52182
Vulnerability from cnvd - Published: 2020-09-16
VLAI Severity ?
Title
GitLab服务器端请求伪造漏洞(CNVD-2020-52182)
Description
GitLab是一个利用Ruby on Rails开发的开源应用程序,实现一个自托管的Git项目仓库,可通过Web界面进行访问公开的或者私人项目。
GitLab 13.1.10, 13.2.8和13.3.4之前版本中存在服务器端请求伪造漏洞,该漏洞源于网络系统或产品的代码开发过程中存在设计或实现不当的问题。目前没有详细的漏洞细节提供。
Severity
中
Patch Name
GitLab服务器端请求伪造漏洞(CNVD-2020-52182)的补丁
Patch Description
GitLab是一个利用Ruby on Rails开发的开源应用程序,实现一个自托管的Git项目仓库,可通过Web界面进行访问公开的或者私人项目。
GitLab 13.1.10, 13.2.8和13.3.4版本中存在服务器端请求伪造漏洞,该漏洞源于网络系统或产品的代码开发过程中存在设计或实现不当的问题。目前没有详细的漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://about.gitlab.com/
Reference
https://nvd.nist.gov/vuln/detail/CVE-2020-13309
Impacted products
| Name | ['GitLab GitLab <13.1.10', 'GitLab GitLab <13.2.8', 'GitLab GitLab <13.3.4'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-13309",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-13309"
}
},
"description": "GitLab\u662f\u4e00\u4e2a\u5229\u7528Ruby on Rails\u5f00\u53d1\u7684\u5f00\u6e90\u5e94\u7528\u7a0b\u5e8f\uff0c\u5b9e\u73b0\u4e00\u4e2a\u81ea\u6258\u7ba1\u7684Git\u9879\u76ee\u4ed3\u5e93\uff0c\u53ef\u901a\u8fc7Web\u754c\u9762\u8fdb\u884c\u8bbf\u95ee\u516c\u5f00\u7684\u6216\u8005\u79c1\u4eba\u9879\u76ee\u3002\n\nGitLab 13.1.10, 13.2.8\u548c13.3.4\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u7684\u4ee3\u7801\u5f00\u53d1\u8fc7\u7a0b\u4e2d\u5b58\u5728\u8bbe\u8ba1\u6216\u5b9e\u73b0\u4e0d\u5f53\u7684\u95ee\u9898\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://about.gitlab.com/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-52182",
"openTime": "2020-09-16",
"patchDescription": "GitLab\u662f\u4e00\u4e2a\u5229\u7528Ruby on Rails\u5f00\u53d1\u7684\u5f00\u6e90\u5e94\u7528\u7a0b\u5e8f\uff0c\u5b9e\u73b0\u4e00\u4e2a\u81ea\u6258\u7ba1\u7684Git\u9879\u76ee\u4ed3\u5e93\uff0c\u53ef\u901a\u8fc7Web\u754c\u9762\u8fdb\u884c\u8bbf\u95ee\u516c\u5f00\u7684\u6216\u8005\u79c1\u4eba\u9879\u76ee\u3002\r\n\r\nGitLab 13.1.10, 13.2.8\u548c13.3.4\u7248\u672c\u4e2d\u5b58\u5728\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u7684\u4ee3\u7801\u5f00\u53d1\u8fc7\u7a0b\u4e2d\u5b58\u5728\u8bbe\u8ba1\u6216\u5b9e\u73b0\u4e0d\u5f53\u7684\u95ee\u9898\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "GitLab\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff08CNVD-2020-52182\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"GitLab GitLab \u003c13.1.10",
"GitLab GitLab \u003c13.2.8",
"GitLab GitLab \u003c13.3.4"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-13309",
"serverity": "\u4e2d",
"submitTime": "2020-09-15",
"title": "GitLab\u670d\u52a1\u5668\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff08CNVD-2020-52182\uff09"
}
FKIE_CVE-2020-13309
Vulnerability from fkie_nvd - Published: 2020-09-14 22:15 - Updated: 2024-11-21 05:01
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5679F06E-96ED-4A34-AF94-2532C22B465B",
"versionEndExcluding": "13.1.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"matchCriteriaId": "724E2186-FCF8-4082-9603-06609EFA4157",
"versionEndExcluding": "13.2.8",
"versionStartIncluding": "13.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD4843F-FD1E-497A-A95F-B7F4C1B8BDA3",
"versionEndExcluding": "13.3.4",
"versionStartIncluding": "13.3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature."
},
{
"lang": "es",
"value": "Se detect\u00f3 una vulnerabilidad en GitLab versiones anteriores a 13.1.10, 13.2.8 y 13.3.4.\u0026#xa0;GitLab era vulnerable a un ataque de tipo SSRF ciego por medio de la funcionalidad repository mirroring"
}
],
"id": "CVE-2020-13309",
"lastModified": "2024-11-21T05:01:00.230",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "cve@gitlab.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-09-14T22:15:11.287",
"references": [
{
"source": "cve@gitlab.com",
"tags": [
"Third Party Advisory"
],
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json"
},
{
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
],
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/215879"
},
{
"source": "cve@gitlab.com",
"tags": [
"Permissions Required"
],
"url": "https://hackerone.com/reports/860196"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/215879"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://hackerone.com/reports/860196"
}
],
"sourceIdentifier": "cve@gitlab.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-F435-R8XF-RC9W
Vulnerability from github – Published: 2022-05-24 17:28 – Updated: 2022-05-24 17:28
VLAI?
Details
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature.
{
"affected": [],
"aliases": [
"CVE-2020-13309"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-09-14T22:15:00Z",
"severity": "HIGH"
},
"details": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature.",
"id": "GHSA-f435-r8xf-rc9w",
"modified": "2022-05-24T17:28:18Z",
"published": "2022-05-24T17:28:18Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13309"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/860196"
},
{
"type": "WEB",
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json"
},
{
"type": "WEB",
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/215879"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2020-13309
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-13309",
"description": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature.",
"id": "GSD-2020-13309"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-13309"
],
"details": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature.",
"id": "GSD-2020-13309",
"modified": "2023-12-13T01:21:47.457284Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@gitlab.com",
"ID": "CVE-2020-13309",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "GitLab",
"version": {
"version_data": [
{
"version_value": "\u003e=1.0, \u003c13.1.10"
},
{
"version_value": "\u003e=13.2, \u003c13.2.8"
},
{
"version_value": "\u003e=13.3, \u003c13.3.4"
}
]
}
}
]
},
"vendor_name": "GitLab"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Thanks [sky003](https://hackerone.com/sky003) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Server-side request forgery (ssrf) in GitLab"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/215879",
"refsource": "MISC",
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/215879"
},
{
"name": "https://hackerone.com/reports/860196",
"refsource": "MISC",
"url": "https://hackerone.com/reports/860196"
},
{
"name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json",
"refsource": "CONFIRM",
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.1.10",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.2.8",
"versionStartIncluding": "13.2.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.3.4",
"versionStartIncluding": "13.3.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@gitlab.com",
"ID": "CVE-2020-13309"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/215879",
"refsource": "MISC",
"tags": [
"Broken Link"
],
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/215879"
},
{
"name": "https://hackerone.com/reports/860196",
"refsource": "MISC",
"tags": [
"Permissions Required"
],
"url": "https://hackerone.com/reports/860196"
},
{
"name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13309.json"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-09-21T16:19Z",
"publishedDate": "2020-09-14T22:15Z"
}
}
}
WID-SEC-W-2025-1087
Vulnerability from csaf_certbund - Published: 2020-09-02 22:00 - Updated: 2025-05-18 22:00Summary
GitLab: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: GitLab ist eine Webanwendung zur Versionsverwaltung für Softwareprojekte auf Basis von git.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in GitLab ausnutzen, um einen Cross-Site Scripting oder Denial of Service Angriff durchzuführen, Sicherheitsmechanismen zu umgehen, Daten zu manipulieren oder vertrauliche Daten einzusehen.
Betroffene Betriebssysteme: - Linux
- Sonstiges
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
References
6 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "GitLab ist eine Webanwendung zur Versionsverwaltung f\u00fcr Softwareprojekte auf Basis von git.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in GitLab ausnutzen, um einen Cross-Site Scripting oder Denial of Service Angriff durchzuf\u00fchren, Sicherheitsmechanismen zu umgehen, Daten zu manipulieren oder vertrauliche Daten einzusehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1087 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2025-1087.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1087 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1087"
},
{
"category": "external",
"summary": "GitLab Security Release 13.3.4, 13.2.8, and 13.1.10 vom 2020-09-02",
"url": "https://about.gitlab.com/releases/2020/09/02/security-release-gitlab-13-3-3-released/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4502-1 vom 2020-09-16",
"url": "https://ubuntu.com/security/notices/USN-4502-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4502-1 vom 2020-09-16",
"url": "https://usn.ubuntu.com/4502-1/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15130-1 vom 2025-05-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZQXVCWSC6AX6RNK43O7WPCY77YBJ6EX/"
}
],
"source_lang": "en-US",
"title": "GitLab: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-05-18T22:00:00.000+00:00",
"generator": {
"date": "2025-05-19T08:27:29.362+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-1087",
"initial_release_date": "2020-09-02T22:00:00.000+00:00",
"revision_history": [
{
"date": "2020-09-02T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2020-09-16T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c13.3.4",
"product": {
"name": "Open Source GitLab \u003c13.3.4",
"product_id": "T017200"
}
},
{
"category": "product_version",
"name": "13.3.4",
"product": {
"name": "Open Source GitLab 13.3.4",
"product_id": "T017200-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:gitlab:gitlab:13.3.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c13.2.8",
"product": {
"name": "Open Source GitLab \u003c13.2.8",
"product_id": "T017201"
}
},
{
"category": "product_version",
"name": "13.2.8",
"product": {
"name": "Open Source GitLab 13.2.8",
"product_id": "T017201-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:gitlab:gitlab:13.2.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c13.1.10",
"product": {
"name": "Open Source GitLab \u003c13.1.10",
"product_id": "T017202"
}
},
{
"category": "product_version",
"name": "13.1.10",
"product": {
"name": "Open Source GitLab 13.1.10",
"product_id": "T017202-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:gitlab:gitlab:13.1.10"
}
}
}
],
"category": "product_name",
"name": "GitLab"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-11022",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-11022"
},
{
"cve": "CVE-2020-13284",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13284"
},
{
"cve": "CVE-2020-13287",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13287"
},
{
"cve": "CVE-2020-13289",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13289"
},
{
"cve": "CVE-2020-13297",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13297"
},
{
"cve": "CVE-2020-13298",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13298"
},
{
"cve": "CVE-2020-13299",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13299"
},
{
"cve": "CVE-2020-13300",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13300"
},
{
"cve": "CVE-2020-13301",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13301"
},
{
"cve": "CVE-2020-13302",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13302"
},
{
"cve": "CVE-2020-13303",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13303"
},
{
"cve": "CVE-2020-13304",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13304"
},
{
"cve": "CVE-2020-13305",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13305"
},
{
"cve": "CVE-2020-13306",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13306"
},
{
"cve": "CVE-2020-13307",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13307"
},
{
"cve": "CVE-2020-13308",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13308"
},
{
"cve": "CVE-2020-13309",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13309"
},
{
"cve": "CVE-2020-13310",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13310"
},
{
"cve": "CVE-2020-13311",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13311"
},
{
"cve": "CVE-2020-13312",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13312"
},
{
"cve": "CVE-2020-13313",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13313"
},
{
"cve": "CVE-2020-13314",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13314"
},
{
"cve": "CVE-2020-13315",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13315"
},
{
"cve": "CVE-2020-13316",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13316"
},
{
"cve": "CVE-2020-13317",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13317"
},
{
"cve": "CVE-2020-13318",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13318"
},
{
"cve": "CVE-2020-7663",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-7663"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…