Vulnerability Description
In SonarQube 8.4.2.36762, an external attacker can achieve authentication bypass through SonarScanner. With an empty value for the -D sonar.login option, anonymous authentication is forced. This allows creating and overwriting public and private projects via the /api/ce/submit endpoint.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sonarsource | Sonarqube | 8.4.2.36762 |
Related Weaknesses (CWE)
References
- https://csl.com.co/sonarqube-auditando-al-auditor-parte-ii/ExploitThird Party Advisory
- https://csl.com.co/sonarqube-auditando-al-auditor-parte-ii/ExploitThird Party Advisory
FAQ
What is CVE-2020-28002?
CVE-2020-28002 is a vulnerability with a CVSS score of 5.3 (MEDIUM). In SonarQube 8.4.2.36762, an external attacker can achieve authentication bypass through SonarScanner. With an empty value for the -D sonar.login option, anonymous authentication is forced. This allow...
How severe is CVE-2020-28002?
CVE-2020-28002 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-28002?
Check the references section above for vendor advisories and patch information. Affected products include: Sonarsource Sonarqube.