CVE-2020-13351
Summary
| CVE | CVE-2020-13351 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-11-17 18:15:00 UTC |
| Updated | 2020-11-27 20:28:00 UTC |
| Description | Insufficient permission checks in scheduled pipeline API in GitLab CE/EE 13.0+ allows an attacker to read variable names and values for scheduled pipelines on projects visible to the attacker. Affected versions are >=13.0, <13.3.9,>=13.4.0, <13.4.5,>=13.5.0, <13.5.2. |
Risk And Classification
Problem Types: CWE-276
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| HackerOne | MISC | hackerone.com | Permissions Required, Third Party Advisory |
| Unauthorized user is able to access schedule pipeline variables and values (#239369) · Issues · GitLab.org / GitLab · GitLab | MISC | gitlab.com | Broken Link |
| 2020/CVE-2020-13351.json · master · GitLab.org / cves · GitLab | CONFIRM | gitlab.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Thanks [@vaib25vicky](https://hackerone.com/vaib25vicky) for reporting this vulnerability through our HackerOne bug bounty program
Legacy QID Mappings
- 690419 Free Berkeley Software Distribution (FreeBSD) Security Update for gitlab (174e466b-1d48-11eb-bd0f-001b217b3468)