Lucene search

K
cve[email protected]CVE-2020-13359
HistoryNov 19, 2020 - 12:15 a.m.

CVE-2020-13359

2020-11-1900:15:12
web.nvd.nist.gov
43
cve-2020-13359
terraform
gitlab
api
object storage
signed url
security vulnerability
nvd

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.7%

The Terraform API in GitLab CE/EE 12.10+ exposed the object storage signed URL on the delete operation allowing a malicious project maintainer to overwrite the Terraform state, bypassing audit and other business controls. Affected versions are >=12.10, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.

Affected configurations

NVD
Node
gitlabgitlabRange12.10.013.3.9community
OR
gitlabgitlabRange12.10.013.3.9enterprise
OR
gitlabgitlabRange13.4.013.4.5community
OR
gitlabgitlabRange13.4.013.4.5enterprise
OR
gitlabgitlabRange13.5.013.5.2community
OR
gitlabgitlabRange13.5.013.5.2enterprise

CNA Affected

[
  {
    "product": "GitLab CE/EE",
    "vendor": "GitLab",
    "versions": [
      {
        "status": "affected",
        "version": ">=12.10"
      },
      {
        "status": "affected",
        "version": "<13.3.9"
      },
      {
        "status": "affected",
        "version": ">=13.4"
      },
      {
        "status": "affected",
        "version": "<13.4.5"
      },
      {
        "status": "affected",
        "version": ">=13.5"
      },
      {
        "status": "affected",
        "version": "<13.5.2"
      }
    ]
  }
]

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.7%