Authentication Bypass Affecting github.com/concourse/concourse package, versions <6.4.1>=6.3.0 <6.3.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.12% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMCONCOURSECONCOURSE-598373
  • published13 Aug 2020
  • disclosed13 Aug 2020
  • creditUnknown

Introduced: 13 Aug 2020

CVE-2020-5415  (opens in a new tab)
CWE-290  (opens in a new tab)

How to fix?

Upgrade github.com/concourse/concourse to version 6.4.1, 6.3.1 or higher.

Overview

github.com/concourse/concourse is an automation system written in Go. It is most commonly used for CI/CD, and is built to scale to any kind of automation pipeline, from simple to complex.

Affected versions of this package are vulnerable to Authentication Bypass. Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team.GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team.

CVSS Scores

version 3.1