CVE-2020-13359

The Terraform API in GitLab CE/EE 12.10+ exposed the object storage signed URL on the delete operation allowing a malicious project maintainer to overwrite the Terraform state, bypassing audit and other business controls. Affected versions are >=12.10, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.6 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N
GitLabCNA
7.6 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 26%
VendorProductVersion
gitlabgitlab
12.10.0 ≤
𝑥
< 13.3.9
gitlabgitlab
12.10.0 ≤
𝑥
< 13.3.9
gitlabgitlab
13.4.0 ≤
𝑥
< 13.4.5
gitlabgitlab
13.4.0 ≤
𝑥
< 13.4.5
gitlabgitlab
13.5.0 ≤
𝑥
< 13.5.2
gitlabgitlab
13.5.0 ≤
𝑥
< 13.5.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gitlab
sid
16.8.4-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gitlab
groovy
dne
focal
dne
bionic
dne
xenial
not-affected
trusty
dne