CVE-2020-13312Improper Restriction of Excessive Authentication Attempts in Gitlab

Severity
9.8CRITICALNVD
EPSS
0.1%
top 70.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 14
Latest updateMay 24

Description

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab OAuth endpoint was vulnerable to brute-force attacks through a specific parameter.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

NVDgitlab/gitlab13.1.013.1.10+2
debiandebian/gitlab< gitlab 13.2.8-1 (sid)
CVEListV5gitlab/gitlab>=13.2, <13.2.8, >=13.3, <13.3.4, >=7.7, <13.1.10+2
gitlabgitlab/gitlab

🔴Vulnerability Details

2
GHSA
GHSA-c5px-g3pm-787c: A vulnerability was discovered in GitLab versions before 132022-05-24
OSV
CVE-2020-13312: A vulnerability was discovered in GitLab versions before 132020-09-14

📋Vendor Advisories

2
GitLab
CVE-2020-13312: A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab OAuth endpoint was vulnerable to brute-force attacks throu2020-09-14
Debian
CVE-2020-13312: gitlab - A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13....2020