Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-13301 (GCVE-0-2020-13301)
Vulnerability from cvelistv5 – Published: 2020-09-14 21:26 – Updated: 2024-08-04 12:11
VLAI?
EPSS
Summary
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page.
Severity ?
5.5 (Medium)
CWE
- Improper neutralization of input during web page generation ('cross-site scripting') in GitLab
Assigner
References
3 references
| URL | Tags |
|---|---|
| https://gitlab.com/gitlab-org/gitlab/-/issues/219378 | x_refsource_MISC |
| https://hackerone.com/reports/882988 | x_refsource_MISC |
| https://gitlab.com/gitlab-org/cves/-/blob/master/… | x_refsource_CONFIRM |
Impacted products
Credits
Thanks [xanbanx](https://hackerone.com/xanbanx) for reporting this vulnerability through our HackerOne bug bounty program
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T12:11:19.527Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/219378"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://hackerone.com/reports/882988"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "GitLab",
"vendor": "GitLab",
"versions": [
{
"status": "affected",
"version": "\u003e=12.10, \u003c13.1.10"
},
{
"status": "affected",
"version": "\u003e=13.2, \u003c13.2.8"
},
{
"status": "affected",
"version": "\u003e=13.3, \u003c13.3.4"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Thanks [xanbanx](https://hackerone.com/xanbanx) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper neutralization of input during web page generation (\u0027cross-site scripting\u0027) in GitLab",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-09-14T21:26:35.000Z",
"orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
"shortName": "GitLab"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/219378"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://hackerone.com/reports/882988"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@gitlab.com",
"ID": "CVE-2020-13301",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "GitLab",
"version": {
"version_data": [
{
"version_value": "\u003e=12.10, \u003c13.1.10"
},
{
"version_value": "\u003e=13.2, \u003c13.2.8"
},
{
"version_value": "\u003e=13.3, \u003c13.3.4"
}
]
}
}
]
},
"vendor_name": "GitLab"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Thanks [xanbanx](https://hackerone.com/xanbanx) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper neutralization of input during web page generation (\u0027cross-site scripting\u0027) in GitLab"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/219378",
"refsource": "MISC",
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/219378"
},
{
"name": "https://hackerone.com/reports/882988",
"refsource": "MISC",
"url": "https://hackerone.com/reports/882988"
},
{
"name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json",
"refsource": "CONFIRM",
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
"assignerShortName": "GitLab",
"cveId": "CVE-2020-13301",
"datePublished": "2020-09-14T21:26:35.000Z",
"dateReserved": "2020-05-21T00:00:00.000Z",
"dateUpdated": "2024-08-04T12:11:19.527Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2020-13301",
"date": "2026-05-12",
"epss": "0.00211",
"percentile": "0.43349"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"13.1.10\", \"matchCriteriaId\": \"5679F06E-96ED-4A34-AF94-2532C22B465B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.2.0\", \"versionEndExcluding\": \"13.2.8\", \"matchCriteriaId\": \"724E2186-FCF8-4082-9603-06609EFA4157\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.3.0\", \"versionEndExcluding\": \"13.3.4\", \"matchCriteriaId\": \"EBD4843F-FD1E-497A-A95F-B7F4C1B8BDA3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page.\"}, {\"lang\": \"es\", \"value\": \"Se detect\\u00f3 una vulnerabilidad en GitLab versiones anteriores a 13.1.10, 13.2.8 y 13.3.4.\u0026#xa0;GitLab era vulnerable a un ataque de tipo XSS almacenado en la p\\u00e1gina standalone vulnerability\"}]",
"id": "CVE-2020-13301",
"lastModified": "2024-11-21T05:00:59.223",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cve@gitlab.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 4.2}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 4.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.7, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:N/I:P/A:N\", \"baseScore\": 3.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 6.8, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2020-09-14T22:15:10.927",
"references": "[{\"url\": \"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json\", \"source\": \"cve@gitlab.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://gitlab.com/gitlab-org/gitlab/-/issues/219378\", \"source\": \"cve@gitlab.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://hackerone.com/reports/882988\", \"source\": \"cve@gitlab.com\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://gitlab.com/gitlab-org/gitlab/-/issues/219378\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://hackerone.com/reports/882988\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\"]}]",
"sourceIdentifier": "cve@gitlab.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-13301\",\"sourceIdentifier\":\"cve@gitlab.com\",\"published\":\"2020-09-14T22:15:10.927\",\"lastModified\":\"2024-11-21T05:00:59.223\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 una vulnerabilidad en GitLab versiones anteriores a 13.1.10, 13.2.8 y 13.3.4.\u0026#xa0;GitLab era vulnerable a un ataque de tipo XSS almacenado en la p\u00e1gina standalone vulnerability\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@gitlab.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":4.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.7,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.1.10\",\"matchCriteriaId\":\"5679F06E-96ED-4A34-AF94-2532C22B465B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.2.0\",\"versionEndExcluding\":\"13.2.8\",\"matchCriteriaId\":\"724E2186-FCF8-4082-9603-06609EFA4157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.3.0\",\"versionEndExcluding\":\"13.3.4\",\"matchCriteriaId\":\"EBD4843F-FD1E-497A-A95F-B7F4C1B8BDA3\"}]}]}],\"references\":[{\"url\":\"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/gitlab-org/gitlab/-/issues/219378\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hackerone.com/reports/882988\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/gitlab-org/gitlab/-/issues/219378\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hackerone.com/reports/882988\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]}]}}"
}
}
GSD-2020-13301
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-13301",
"description": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page.",
"id": "GSD-2020-13301"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-13301"
],
"details": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page.",
"id": "GSD-2020-13301",
"modified": "2023-12-13T01:21:47.336515Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@gitlab.com",
"ID": "CVE-2020-13301",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "GitLab",
"version": {
"version_data": [
{
"version_value": "\u003e=12.10, \u003c13.1.10"
},
{
"version_value": "\u003e=13.2, \u003c13.2.8"
},
{
"version_value": "\u003e=13.3, \u003c13.3.4"
}
]
}
}
]
},
"vendor_name": "GitLab"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Thanks [xanbanx](https://hackerone.com/xanbanx) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper neutralization of input during web page generation (\u0027cross-site scripting\u0027) in GitLab"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/219378",
"refsource": "MISC",
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/219378"
},
{
"name": "https://hackerone.com/reports/882988",
"refsource": "MISC",
"url": "https://hackerone.com/reports/882988"
},
{
"name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json",
"refsource": "CONFIRM",
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.1.10",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.2.8",
"versionStartIncluding": "13.2.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.3.4",
"versionStartIncluding": "13.3.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@gitlab.com",
"ID": "CVE-2020-13301"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://hackerone.com/reports/882988",
"refsource": "MISC",
"tags": [
"Permissions Required"
],
"url": "https://hackerone.com/reports/882988"
},
{
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/219378",
"refsource": "MISC",
"tags": [
"Broken Link"
],
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/219378"
},
{
"name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
},
"lastModifiedDate": "2020-09-16T20:24Z",
"publishedDate": "2020-09-14T22:15Z"
}
}
}
GHSA-3RPG-JFVW-X748
Vulnerability from github – Published: 2022-05-24 17:28 – Updated: 2022-05-24 17:28
VLAI?
Details
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page.
{
"affected": [],
"aliases": [
"CVE-2020-13301"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-09-14T22:15:00Z",
"severity": "LOW"
},
"details": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page.",
"id": "GHSA-3rpg-jfvw-x748",
"modified": "2022-05-24T17:28:17Z",
"published": "2022-05-24T17:28:17Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13301"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/882988"
},
{
"type": "WEB",
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json"
},
{
"type": "WEB",
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/219378"
}
],
"schema_version": "1.4.0",
"severity": []
}
CNVD-2020-51539
Vulnerability from cnvd - Published: 2020-09-11
VLAI Severity ?
Title
GitLab跨站脚本漏洞(CNVD-2020-51539)
Description
GitLab是美国GitLab公司的一款使用Ruby on Rails开发的、自托管的、Git(版本控制系统)项目仓库应用程序。该程序可用于查阅项目的文件内容、提交历史、Bug列表等。
GitLab 13.0版本及更高版本存在跨站脚本漏洞,该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Severity
中
Patch Name
GitLab跨站脚本漏洞(CNVD-2020-51539)的补丁
Patch Description
GitLab是美国GitLab公司的一款使用Ruby on Rails开发的、自托管的、Git(版本控制系统)项目仓库应用程序。该程序可用于查阅项目的文件内容、提交历史、Bug列表等。
GitLab 13.0版本及更高版本存在跨站脚本漏洞,该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://www.auscert.org.au/bulletins/ESB-2020.3028/
Reference
https://www.auscert.org.au/bulletins/ESB-2020.3028/
Impacted products
| Name | GitLab GitLab >=13.0 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-13301",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-13301"
}
},
"description": "GitLab\u662f\u7f8e\u56fdGitLab\u516c\u53f8\u7684\u4e00\u6b3e\u4f7f\u7528Ruby on Rails\u5f00\u53d1\u7684\u3001\u81ea\u6258\u7ba1\u7684\u3001Git\uff08\u7248\u672c\u63a7\u5236\u7cfb\u7edf\uff09\u9879\u76ee\u4ed3\u5e93\u5e94\u7528\u7a0b\u5e8f\u3002\u8be5\u7a0b\u5e8f\u53ef\u7528\u4e8e\u67e5\u9605\u9879\u76ee\u7684\u6587\u4ef6\u5185\u5bb9\u3001\u63d0\u4ea4\u5386\u53f2\u3001Bug\u5217\u8868\u7b49\u3002\n\nGitLab 13.0\u7248\u672c\u53ca\u66f4\u9ad8\u7248\u672c\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eWEB\u5e94\u7528\u7f3a\u5c11\u5bf9\u5ba2\u6237\u7aef\u6570\u636e\u7684\u6b63\u786e\u9a8c\u8bc1\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u5ba2\u6237\u7aef\u4ee3\u7801\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.auscert.org.au/bulletins/ESB-2020.3028/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-51539",
"openTime": "2020-09-11",
"patchDescription": "GitLab\u662f\u7f8e\u56fdGitLab\u516c\u53f8\u7684\u4e00\u6b3e\u4f7f\u7528Ruby on Rails\u5f00\u53d1\u7684\u3001\u81ea\u6258\u7ba1\u7684\u3001Git\uff08\u7248\u672c\u63a7\u5236\u7cfb\u7edf\uff09\u9879\u76ee\u4ed3\u5e93\u5e94\u7528\u7a0b\u5e8f\u3002\u8be5\u7a0b\u5e8f\u53ef\u7528\u4e8e\u67e5\u9605\u9879\u76ee\u7684\u6587\u4ef6\u5185\u5bb9\u3001\u63d0\u4ea4\u5386\u53f2\u3001Bug\u5217\u8868\u7b49\u3002\r\n\r\nGitLab 13.0\u7248\u672c\u53ca\u66f4\u9ad8\u7248\u672c\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eWEB\u5e94\u7528\u7f3a\u5c11\u5bf9\u5ba2\u6237\u7aef\u6570\u636e\u7684\u6b63\u786e\u9a8c\u8bc1\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u5ba2\u6237\u7aef\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "GitLab\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2020-51539\uff09\u7684\u8865\u4e01",
"products": {
"product": "GitLab GitLab \u003e=13.0"
},
"referenceLink": "https://www.auscert.org.au/bulletins/ESB-2020.3028/",
"serverity": "\u4e2d",
"submitTime": "2020-09-04",
"title": "GitLab\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2020-51539\uff09"
}
FKIE_CVE-2020-13301
Vulnerability from fkie_nvd - Published: 2020-09-14 22:15 - Updated: 2024-11-21 05:00
Severity ?
5.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5679F06E-96ED-4A34-AF94-2532C22B465B",
"versionEndExcluding": "13.1.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"matchCriteriaId": "724E2186-FCF8-4082-9603-06609EFA4157",
"versionEndExcluding": "13.2.8",
"versionStartIncluding": "13.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD4843F-FD1E-497A-A95F-B7F4C1B8BDA3",
"versionEndExcluding": "13.3.4",
"versionStartIncluding": "13.3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page."
},
{
"lang": "es",
"value": "Se detect\u00f3 una vulnerabilidad en GitLab versiones anteriores a 13.1.10, 13.2.8 y 13.3.4.\u0026#xa0;GitLab era vulnerable a un ataque de tipo XSS almacenado en la p\u00e1gina standalone vulnerability"
}
],
"id": "CVE-2020-13301",
"lastModified": "2024-11-21T05:00:59.223",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 4.2,
"source": "cve@gitlab.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-09-14T22:15:10.927",
"references": [
{
"source": "cve@gitlab.com",
"tags": [
"Third Party Advisory"
],
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json"
},
{
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
],
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/219378"
},
{
"source": "cve@gitlab.com",
"tags": [
"Permissions Required"
],
"url": "https://hackerone.com/reports/882988"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/219378"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://hackerone.com/reports/882988"
}
],
"sourceIdentifier": "cve@gitlab.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2025-1087
Vulnerability from csaf_certbund - Published: 2020-09-02 22:00 - Updated: 2025-05-18 22:00Summary
GitLab: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: GitLab ist eine Webanwendung zur Versionsverwaltung für Softwareprojekte auf Basis von git.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in GitLab ausnutzen, um einen Cross-Site Scripting oder Denial of Service Angriff durchzuführen, Sicherheitsmechanismen zu umgehen, Daten zu manipulieren oder vertrauliche Daten einzusehen.
Betroffene Betriebssysteme: - Linux
- Sonstiges
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
5 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source GitLab <13.3.4
Open Source / GitLab
|
<13.3.4 | ||
|
Open Source GitLab <13.2.8
Open Source / GitLab
|
<13.2.8 | ||
|
Open Source GitLab <13.1.10
Open Source / GitLab
|
<13.1.10 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
References
6 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "GitLab ist eine Webanwendung zur Versionsverwaltung f\u00fcr Softwareprojekte auf Basis von git.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in GitLab ausnutzen, um einen Cross-Site Scripting oder Denial of Service Angriff durchzuf\u00fchren, Sicherheitsmechanismen zu umgehen, Daten zu manipulieren oder vertrauliche Daten einzusehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1087 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2025-1087.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1087 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1087"
},
{
"category": "external",
"summary": "GitLab Security Release 13.3.4, 13.2.8, and 13.1.10 vom 2020-09-02",
"url": "https://about.gitlab.com/releases/2020/09/02/security-release-gitlab-13-3-3-released/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4502-1 vom 2020-09-16",
"url": "https://ubuntu.com/security/notices/USN-4502-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4502-1 vom 2020-09-16",
"url": "https://usn.ubuntu.com/4502-1/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15130-1 vom 2025-05-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZQXVCWSC6AX6RNK43O7WPCY77YBJ6EX/"
}
],
"source_lang": "en-US",
"title": "GitLab: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-05-18T22:00:00.000+00:00",
"generator": {
"date": "2025-05-19T08:27:29.362+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-1087",
"initial_release_date": "2020-09-02T22:00:00.000+00:00",
"revision_history": [
{
"date": "2020-09-02T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2020-09-16T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c13.3.4",
"product": {
"name": "Open Source GitLab \u003c13.3.4",
"product_id": "T017200"
}
},
{
"category": "product_version",
"name": "13.3.4",
"product": {
"name": "Open Source GitLab 13.3.4",
"product_id": "T017200-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:gitlab:gitlab:13.3.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c13.2.8",
"product": {
"name": "Open Source GitLab \u003c13.2.8",
"product_id": "T017201"
}
},
{
"category": "product_version",
"name": "13.2.8",
"product": {
"name": "Open Source GitLab 13.2.8",
"product_id": "T017201-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:gitlab:gitlab:13.2.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c13.1.10",
"product": {
"name": "Open Source GitLab \u003c13.1.10",
"product_id": "T017202"
}
},
{
"category": "product_version",
"name": "13.1.10",
"product": {
"name": "Open Source GitLab 13.1.10",
"product_id": "T017202-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:gitlab:gitlab:13.1.10"
}
}
}
],
"category": "product_name",
"name": "GitLab"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-11022",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-11022"
},
{
"cve": "CVE-2020-13284",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13284"
},
{
"cve": "CVE-2020-13287",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13287"
},
{
"cve": "CVE-2020-13289",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13289"
},
{
"cve": "CVE-2020-13297",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13297"
},
{
"cve": "CVE-2020-13298",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13298"
},
{
"cve": "CVE-2020-13299",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13299"
},
{
"cve": "CVE-2020-13300",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13300"
},
{
"cve": "CVE-2020-13301",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13301"
},
{
"cve": "CVE-2020-13302",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13302"
},
{
"cve": "CVE-2020-13303",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13303"
},
{
"cve": "CVE-2020-13304",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13304"
},
{
"cve": "CVE-2020-13305",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13305"
},
{
"cve": "CVE-2020-13306",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13306"
},
{
"cve": "CVE-2020-13307",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13307"
},
{
"cve": "CVE-2020-13308",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13308"
},
{
"cve": "CVE-2020-13309",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13309"
},
{
"cve": "CVE-2020-13310",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13310"
},
{
"cve": "CVE-2020-13311",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13311"
},
{
"cve": "CVE-2020-13312",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13312"
},
{
"cve": "CVE-2020-13313",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13313"
},
{
"cve": "CVE-2020-13314",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13314"
},
{
"cve": "CVE-2020-13315",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13315"
},
{
"cve": "CVE-2020-13316",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13316"
},
{
"cve": "CVE-2020-13317",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13317"
},
{
"cve": "CVE-2020-13318",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-13318"
},
{
"cve": "CVE-2020-7663",
"product_status": {
"known_affected": [
"T017200",
"T017201",
"T017202",
"T000126",
"T027843"
]
},
"release_date": "2020-09-02T22:00:00.000+00:00",
"title": "CVE-2020-7663"
}
]
}
bit-gitlab-2020-13301
Vulnerability from bitnami_vulndb
Published
2024-03-06 11:22
Modified
2025-04-03 14:40
Summary
Details
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "gitlab",
"purl": "pkg:bitnami/gitlab"
},
"ranges": [
{
"events": [
{
"introduced": "12.10.0"
},
{
"fixed": "13.1.10"
},
{
"introduced": "13.2.0"
},
{
"fixed": "13.2.8"
},
{
"introduced": "13.3.0"
},
{
"fixed": "13.3.4"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2020-13301"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
],
"severity": "Medium"
},
"details": "A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was vulnerable to a stored XSS on the standalone vulnerability page.",
"id": "BIT-gitlab-2020-13301",
"modified": "2025-04-03T14:40:37.652Z",
"published": "2024-03-06T11:22:35.003Z",
"references": [
{
"type": "WEB",
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13301.json"
},
{
"type": "WEB",
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/219378"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/882988"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13301"
}
],
"schema_version": "1.5.0"
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…