CVE-2020-13312

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab OAuth endpoint was vulnerable to brute-force attacks through a specific parameter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 05:01

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 9.8
v2 : 5.0
v3 : 6.5
References () https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13312.json - Vendor Advisory () https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13312.json - Vendor Advisory
References () https://gitlab.com/gitlab-org/gitlab/-/issues/29746 - Broken Link () https://gitlab.com/gitlab-org/gitlab/-/issues/29746 - Broken Link

Information

Published : 2020-09-14 20:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13312

Mitre link : CVE-2020-13312

CVE.ORG link : CVE-2020-13312


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts