Insecure Session Key Storage in GitLab Allows Unauthorized User Authentication

Insecure Session Key Storage in GitLab Allows Unauthorized User Authentication

CVE-2020-13344 · MEDIUM Severity

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

An issue has been discovered in GitLab affecting all versions prior to 13.2.10, 13.3.7 and 13.4.2. Sessions keys are stored in plain-text in Redis which allows attacker with Redis access to authenticate as any user that has a session stored in Redis

Learn more about our User Device Pen Test.