A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was not revoking current user sessions when 2 factor authentication was activated allowing a malicious user to maintain their access.
According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gitlab | Gitlab | 13.1.0 (including) | 13.1.10 (excluding) |
Gitlab | Gitlab | 13.2.0 (including) | 13.2.8 (excluding) |
Gitlab | Gitlab | 13.3.0 (including) | 13.3.4 (excluding) |
Gitlab | Ubuntu | esm-apps/xenial | * |
Gitlab | Ubuntu | upstream | * |
Gitlab | Ubuntu | xenial | * |