Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/concourse/dex
  4. ›
  5. CVE-2020-5415

CVE-2020-5415: Authentication Bypass by Spoofing

December 20, 2021

Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team.

References

  • github.com/advisories/GHSA-627p-rr78-99rj
  • github.com/concourse/concourse/security/advisories/GHSA-627p-rr78-99rj
  • nvd.nist.gov/vuln/detail/CVE-2020-5415
  • tanzu.vmware.com/security/cve-2020-5415

Code Behaviors & Features

Detect and mitigate CVE-2020-5415 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

Version 6.4.0, version 6.3.0

Fixed versions

  • 6.4.1
  • 6.4.1

Solution

Upgrade to versions 6.4.1, 6.4.1 or above.

Impact 10 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-290: Authentication Bypass by Spoofing

Source file

go/github.com/concourse/dex/CVE-2020-5415.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:58 +0000.