Description
Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team.
Published: 2020-08-12
Score: 10.0 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-2453 Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team.
Github GHSA Github GHSA GHSA-627p-rr78-99rj GitLab auth uses full name instead of username as user ID, allowing impersonation
History

No history.

Subscriptions

Pivotal Software Concourse
cve-icon MITRE

Status: PUBLISHED

Assigner: pivotal

Published:

Updated: 2024-09-16T17:53:07.446Z

Reserved: 2020-01-03T00:00:00.000Z

Link: CVE-2020-5415

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-12T17:15:12.633

Modified: 2024-11-21T05:34:07.587

Link: CVE-2020-5415

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses