Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-2453 Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team.
Github GHSA Github GHSA GHSA-627p-rr78-99rj GitLab auth uses full name instead of username as user ID, allowing impersonation
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: pivotal

Published:

Updated: 2024-09-16T17:53:07.446Z

Reserved: 2020-01-03T00:00:00

Link: CVE-2020-5415

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-12T17:15:12.633

Modified: 2024-11-21T05:34:07.587

Link: CVE-2020-5415

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.