logo

CVE-2020-13353 gitaly

Package

Manager: gem
Name: gitaly
Vulnerable Version: >=1.79.0 <13.3.9 || >=13.4 <13.4.5 || >=13.5 <13.5.2

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

EPSS: 0.00081 pctl0.24569

Details

Gitaly Insufficient Session Expiration vulnerability When importing repos via URL, one time use git credentials were persisted beyond the expected time window in Gitaly 1.79.0 or above. Affected versions are: >=1.79.0, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.

Metadata

Created: 2022-05-24T17:34:24Z
Modified: 2023-01-24T18:35:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-mmmm-chjf-jmvw/GHSA-mmmm-chjf-jmvw.json
CWE IDs: ["CWE-613"]
Alternative ID: GHSA-mmmm-chjf-jmvw
Finding: F068
Auto approve: 1