Description
Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2453 | Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team. |
Github GHSA |
GHSA-627p-rr78-99rj | GitLab auth uses full name instead of username as user ID, allowing impersonation |
References
History
No history.
Status: PUBLISHED
Assigner: pivotal
Published:
Updated: 2024-09-16T17:53:07.446Z
Reserved: 2020-01-03T00:00:00.000Z
Link: CVE-2020-5415
No data.
Status : Modified
Published: 2020-08-12T17:15:12.633
Modified: 2024-11-21T05:34:07.587
Link: CVE-2020-5415
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA