Vulnerability Description
A command injection vulnerability was discovered in Gitlab runner versions prior to 13.2.4, 13.3.2 and 13.4.1. When the runner is configured on a Windows system with a docker executor, which allows the attacker to run arbitrary commands on Windows host, via DOCKER_AUTH_CONFIG build variable.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 12.0.0, < 13.2.4 |
Related Weaknesses (CWE)
References
- https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13347.jsonVendor Advisory
- https://gitlab.com/gitlab-org/gitlab-runner/-/issues/26725Broken LinkVendor Advisory
- https://hackerone.com/reports/955016Permissions RequiredThird Party Advisory
- https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13347.jsonVendor Advisory
- https://gitlab.com/gitlab-org/gitlab-runner/-/issues/26725Broken LinkVendor Advisory
- https://hackerone.com/reports/955016Permissions RequiredThird Party Advisory
FAQ
What is CVE-2020-13347?
CVE-2020-13347 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A command injection vulnerability was discovered in Gitlab runner versions prior to 13.2.4, 13.3.2 and 13.4.1. When the runner is configured on a Windows system with a docker executor, which allows th...
How severe is CVE-2020-13347?
CVE-2020-13347 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-13347?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.