Vulnerability Description
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was not revoking current user sessions when 2 factor authentication was activated allowing a malicious user to maintain their access.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 13.1.0, < 13.1.10 |
Related Weaknesses (CWE)
References
- https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13307.jsonVendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/31307Broken Link
- https://hackerone.com/reports/676772PatchThird Party Advisory
- https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13307.jsonVendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/31307Broken Link
- https://hackerone.com/reports/676772PatchThird Party Advisory
FAQ
What is CVE-2020-13307?
CVE-2020-13307 is a vulnerability with a CVSS score of 3.8 (LOW). A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was not revoking current user sessions when 2 factor authentication was activated allowing a malicious user ...
How severe is CVE-2020-13307?
CVE-2020-13307 has been rated LOW with a CVSS base score of 3.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-13307?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.