{"vulnerability": "CVE-2020-1335", "sightings": [{"uuid": "5d04fed0-8fa0-4ab6-8c3b-5dcf9f7784f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20022", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T15:25:24.000000Z"}, {"uuid": "f62e5ea6-d117-4b60-a9af-83a09f988af6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20233", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:34:23.000000Z"}, {"uuid": "e341245d-0139-434c-8930-7a867d4c85e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20098", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:35:31.000000Z"}, {"uuid": "f3586e67-c649-4a7d-be70-1eaa1688aa39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13356", "type": "seen", "source": "https://t.me/cibsecurity/17403", "content": "\u203c CVE-2020-13356 \u203c\n\nAn issue has been discovered in GitLab CE/EE affecting all versions starting from 8.8.9. A specially crafted request could bypass Multipart protection and read files in certain specific paths on the server. Affected versions are: &gt;=8.8.9, &lt;13.3.9,&gt;=13.4, &lt;13.4.5,&gt;=13.5, &lt;13.5.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T06:25:28.000000Z"}, {"uuid": "adc7607b-3308-4a40-95ab-c4728bb3af3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/19965", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T14:25:41.000000Z"}, {"uuid": "0e134b39-0e9d-41eb-b640-e634bb5993aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20118", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T17:25:25.000000Z"}, {"uuid": "adecce23-6185-4d71-b743-640f8e9d2ddd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20080", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:25:28.000000Z"}, {"uuid": "4f1c5288-62e9-4857-ade0-6ae9eea55fed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/19925", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T12:35:23.000000Z"}, {"uuid": "bece7a1a-34ad-400b-ad93-92b60c0bb9f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20214", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:31:24.000000Z"}, {"uuid": "bf452119-be88-4147-86be-8712a63007e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20136", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:05:00.000000Z"}, {"uuid": "b76690a4-e19c-4c8e-9321-c875feec42f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20194", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:25:18.000000Z"}, {"uuid": "b4e3f099-dbad-4e48-885a-789e57ee84a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20174", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:24:19.000000Z"}, {"uuid": "ff67f0ee-072f-4fe8-a6ba-c3f85bdbd248", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20041", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:16:01.000000Z"}, {"uuid": "7ed710d5-8cf8-46f8-b0a1-4d2c8ee964a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20156", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:11:09.000000Z"}, {"uuid": "dea53b06-025b-4651-b582-2c4d8195a464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13350", "type": "seen", "source": "https://t.me/cibsecurity/17341", "content": "\u203c CVE-2020-13350 \u203c\n\nCSRF in runner administration page in all versions of GitLab CE/EE allows an attacker who's able to target GitLab instance administrators to pause/resume runners. Affected versions are &gt;=13.5.0, &lt;13.5.2,&gt;=13.4.0, &lt;13.4.5,&lt;13.3.9.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T03:25:16.000000Z"}, {"uuid": "5ec853bb-e5bd-4035-9941-e27447273ee7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20060", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:24:20.000000Z"}, {"uuid": "ed7888b5-9cd0-4c3a-ab5e-e62be04cfb7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/20002", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T14:41:37.000000Z"}, {"uuid": "51b34011-9fa6-43d0-86f1-776a21846c0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/19806", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T07:38:24.000000Z"}, {"uuid": "ba17775f-3e01-44f7-b952-8e90a053d769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13355", "type": "seen", "source": "https://t.me/cibsecurity/17406", "content": "\u203c CVE-2020-13355 \u203c\n\nAn issue has been discovered in GitLab CE/EE affecting all versions starting from 8.14. A path traversal is found in LFS Upload that allows attacker to overwrite certain specific paths on the server. Affected versions are: &gt;=8.14, &lt;13.3.9,&gt;=13.4, &lt;13.4.5,&gt;=13.5, &lt;13.5.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T06:25:31.000000Z"}, {"uuid": "aa1b1c23-aaa8-4425-83b5-c661eaf564d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13359", "type": "seen", "source": "https://t.me/cibsecurity/17405", "content": "\u203c CVE-2020-13359 \u203c\n\nThe Terraform API in GitLab CE/EE 12.10+ exposed the object storage signed URL on the delete operation allowing a malicious project maintainer to overwrite the Terraform state, bypassing audit and other business controls. Affected versions are &gt;=12.10, &lt;13.3.9,&gt;=13.4, &lt;13.4.5,&gt;=13.5, &lt;13.5.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T06:25:30.000000Z"}, {"uuid": "f8b0d087-142b-44f0-813a-92fffbe5ab43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/19945", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T13:25:32.000000Z"}, {"uuid": "d0eb9372-7cfe-4c0d-930b-8d19c88d98d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/19982", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T14:35:25.000000Z"}, {"uuid": "0937da44-ca0b-4224-b890-d98a8de71518", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/19786", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T07:35:25.000000Z"}, {"uuid": "8cf7e417-1831-4c90-87d9-394dfab2f437", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/19906", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T12:25:31.000000Z"}, {"uuid": "fce69eb3-90d1-4562-b315-997165d7070c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/19886", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T11:25:37.000000Z"}, {"uuid": "84eed604-2c8e-44ef-bf41-ce1a5620e447", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/19866", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T10:25:42.000000Z"}, {"uuid": "e9103110-adc8-42b8-9f23-7fd9ad8b45d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/19846", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T09:25:38.000000Z"}, {"uuid": "80b0e71e-3d60-4ec5-8b23-b3660713c092", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13357", "type": "seen", "source": "https://t.me/cibsecurity/19826", "content": "\u203c CVE-2020-13357 \u203c\n\nAn issue was discovered in Gitlab CE/EE versions &gt;= 13.1 to &lt;13.4.7, &gt;= 13.5 to &lt;13.5.5, and &gt;= 13.6 to &lt;13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T08:25:43.000000Z"}, {"uuid": "8653440c-ffbc-47c8-b398-70eff8094a2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13351", "type": "seen", "source": "https://t.me/cibsecurity/17339", "content": "\u203c CVE-2020-13351 \u203c\n\nInsufficient permission checks in scheduled pipeline API in GitLab CE/EE 13.0+ allows an attacker to read variable names and values for scheduled pipelines on projects visible to the attacker. Affected versions are &gt;=13.0, &lt;13.3.9,&gt;=13.4.0, &lt;13.4.5,&gt;=13.5.0, &lt;13.5.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T03:25:14.000000Z"}, {"uuid": "f5a91be1-c2ed-4d92-bf71-8df588dbd468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13352", "type": "seen", "source": "https://t.me/cibsecurity/16423", "content": "\u203c CVE-2020-13352 \u203c\n\nPrivate group info is leaked leaked in GitLab CE/EE version 10.2 and above, when the project is moved from private to public group. Affected versions are: &gt;=10.2, &lt;13.3.9,&gt;=13.4, &lt;13.4.5,&gt;=13.5, &lt;13.5.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-17T07:38:27.000000Z"}, {"uuid": "108029f0-b99f-41dd-b878-d66b6b976bad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13351", "type": "seen", "source": "https://t.me/cibsecurity/16459", "content": "\u203c CVE-2020-13351 \u203c\n\nInsufficient permission checks in scheduled pipeline API in GitLab CE/EE 13.0+ allows an attacker to read variable names and values for scheduled pipelines on projects visible to the attacker. Affected versions are &gt;=13.0, &lt;13.3.9,&gt;=13.4.0, &lt;13.4.5,&gt;=13.5.0, &lt;13.5.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-17T20:39:14.000000Z"}, {"uuid": "0ecf9696-a442-4869-94ef-3669371771f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13350", "type": "seen", "source": "https://t.me/cibsecurity/16461", "content": "\u203c CVE-2020-13350 \u203c\n\nCSRF in runner administration page in all versions of GitLab CE/EE allows an attacker who's able to target GitLab instance administrators to pause/resume runners. Affected versions are &gt;=13.5.0, &lt;13.5.2,&gt;=13.4.0, &lt;13.4.5,&lt;13.3.9.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-17T20:39:16.000000Z"}, {"uuid": "9cb8d0fa-39af-48cd-a5b7-cf3f2d428006", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13358", "type": "seen", "source": "https://t.me/cibsecurity/16426", "content": "\u203c CVE-2020-13358 \u203c\n\nA vulnerability in the internal Kubernetes agent api in GitLab CE/EE version 13.3 and above allows unauthorized access to private projects. Affected versions are: &gt;=13.4, &lt;13.4.5,&gt;=13.3, &lt;13.3.9,&gt;=13.5, &lt;13.5.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-17T07:38:30.000000Z"}, {"uuid": "85fe47fe-2cf2-469a-976a-8c7f84510b76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13354", "type": "seen", "source": "https://t.me/cibsecurity/16427", "content": "\u203c CVE-2020-13354 \u203c\n\nA potential DOS vulnerability was discovered in GitLab CE/EE starting with version 12.6. The container registry name check could cause exponential number of backtracks for certain user supplied values resulting in high CPU usage. Affected versions are: &gt;=12.6, &lt;13.3.9.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-17T07:38:31.000000Z"}, {"uuid": "77dd04ab-980c-4e59-bd51-ffe591a4138c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13353", "type": "seen", "source": "https://t.me/cibsecurity/16420", "content": "\u203c CVE-2020-13353 \u203c\n\nWhen importing repos via URL, one time use git credentials were persisted beyond the expected time window in Gitaly 1.79.0 or above. Affected versions are: &gt;=1.79.0, &lt;13.3.9,&gt;=13.4, &lt;13.4.5,&gt;=13.5, &lt;13.5.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-17T07:38:24.000000Z"}]}