CVE-2020-13359

The Terraform API in GitLab CE/EE 12.10+ exposed the object storage signed URL on the delete operation allowing a malicious project maintainer to overwrite the Terraform state, bypassing audit and other business controls. Affected versions are >=12.10, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 05:01

Type Values Removed Values Added
References () https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13359.json - Vendor Advisory () https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13359.json - Vendor Advisory
References () https://gitlab.com/gitlab-org/gitlab/-/issues/250266 - Broken Link () https://gitlab.com/gitlab-org/gitlab/-/issues/250266 - Broken Link

Information

Published : 2020-11-19 00:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13359

Mitre link : CVE-2020-13359

CVE.ORG link : CVE-2020-13359


JSON object : View

Products Affected

gitlab

  • gitlab