We found results for “”
CVE-2020-5415
Good to know:
Date: August 12, 2020
Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team.
Language: Go
Severity Score
Severity Score
Weakness Type (CWE)
Authentication Bypass by Spoofing
CWE-290Top Fix
Upgrade Version
Upgrade to version github.com/concourse/concourse - v6.4.1;github.com/concourse/concourse - v6.3.1;github.com/concourse/concourse - v1.6.1-0.20200730151558-b00d1c8d8576;github.com/concourse/concourse - v0.0.0-20200730151558-b00d1c8d8576;github.com/concourse/dex - v0.0.0-20200730150203-821b48abfd88
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | CHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | NETWORK |
| Access Complexity (AC): | LOW |
| Authentication (AU): | NONE |
| Confidentiality (C): | PARTIAL |
| Integrity (I): | PARTIAL |
| Availability (A): | NONE |
| Additional information: |
Vulnerabilities
Projects
Contact Us


