Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

2 vulnerabilities by Gerrit

CVE-2020-8920 (GCVE-0-2020-8920)

Vulnerability from cvelistv5 – Published: 2020-12-10 10:15 – Updated: 2024-08-04 10:12
VLAI?
Title
Overoptimization leads to private information leak in Gerrit
Summary
An information leak vulnerability exists in Gerrit versions prior to 2.14.22, 2.15.21, 2.16.25, 3.0.15, 3.1.10, 3.2.5 where an overoptimization with the FilteredRepository wrapper skips the verification of access on All-Users repositories, allowing an attacker to get read access to all users' personal information associated with their accounts.
CWE
Assigner
Impacted products
Vendor Product Version
Gerrit Gerrit Affected: stable , < 2.14.22 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:10.990Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gerritcodereview.com/2.15.html#21521"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gerritcodereview.com/2.16.html#21625"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gerritcodereview.com/3.0.html#3014"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gerritcodereview.com/3.1.html#3110"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gerritcodereview.com/3.2.html#325"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://gerrit.googlesource.com/gerrit/+/45071d6977932bca5a1427c8abad24710fed2e33"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gerritcodereview.com/2.14.html#21422"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Gerrit",
          "vendor": "Gerrit",
          "versions": [
            {
              "changes": [
                {
                  "at": "2.15.21",
                  "status": "unaffected"
                },
                {
                  "at": "2.16.25",
                  "status": "unaffected"
                },
                {
                  "at": "3.0.15",
                  "status": "unaffected"
                },
                {
                  "at": "3.1.10",
                  "status": "unaffected"
                },
                {
                  "at": "3.2.5",
                  "status": "unaffected"
                }
              ],
              "lessThan": "2.14.22",
              "status": "affected",
              "version": "stable",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An information leak vulnerability exists in Gerrit versions prior to 2.14.22, 2.15.21, 2.16.25, 3.0.15, 3.1.10, 3.2.5 where an overoptimization with the FilteredRepository wrapper skips the verification of access on All-Users repositories, allowing an attacker to get read access to all users\u0027 personal information associated with their accounts."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "CWE-285 Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-12-10T10:15:23.000Z",
        "orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
        "shortName": "Google"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gerritcodereview.com/2.15.html#21521"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gerritcodereview.com/2.16.html#21625"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gerritcodereview.com/3.0.html#3014"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gerritcodereview.com/3.1.html#3110"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gerritcodereview.com/3.2.html#325"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://gerrit.googlesource.com/gerrit/+/45071d6977932bca5a1427c8abad24710fed2e33"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gerritcodereview.com/2.14.html#21422"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Overoptimization leads to private information leak in Gerrit",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2020-8920",
          "STATE": "PUBLIC",
          "TITLE": "Overoptimization leads to private information leak in Gerrit"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Gerrit",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "stable",
                            "version_value": "2.14.22"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "stable",
                            "version_value": "2.15.21"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "stable",
                            "version_value": "2.16.25"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "stable",
                            "version_value": "3.0.15"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "stable",
                            "version_value": "3.1.10"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "stable",
                            "version_value": "3.2.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Gerrit"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An information leak vulnerability exists in Gerrit versions prior to 2.14.22, 2.15.21, 2.16.25, 3.0.15, 3.1.10, 3.2.5 where an overoptimization with the FilteredRepository wrapper skips the verification of access on All-Users repositories, allowing an attacker to get read access to all users\u0027 personal information associated with their accounts."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-285 Improper Authorization"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.gerritcodereview.com/2.15.html#21521",
              "refsource": "CONFIRM",
              "url": "https://www.gerritcodereview.com/2.15.html#21521"
            },
            {
              "name": "https://www.gerritcodereview.com/2.16.html#21625",
              "refsource": "CONFIRM",
              "url": "https://www.gerritcodereview.com/2.16.html#21625"
            },
            {
              "name": "https://www.gerritcodereview.com/3.0.html#3014",
              "refsource": "CONFIRM",
              "url": "https://www.gerritcodereview.com/3.0.html#3014"
            },
            {
              "name": "https://www.gerritcodereview.com/3.1.html#3110",
              "refsource": "CONFIRM",
              "url": "https://www.gerritcodereview.com/3.1.html#3110"
            },
            {
              "name": "https://www.gerritcodereview.com/3.2.html#325",
              "refsource": "CONFIRM",
              "url": "https://www.gerritcodereview.com/3.2.html#325"
            },
            {
              "name": "https://gerrit.googlesource.com/gerrit/+/45071d6977932bca5a1427c8abad24710fed2e33",
              "refsource": "CONFIRM",
              "url": "https://gerrit.googlesource.com/gerrit/+/45071d6977932bca5a1427c8abad24710fed2e33"
            },
            {
              "name": "https://www.gerritcodereview.com/2.14.html#21422",
              "refsource": "CONFIRM",
              "url": "https://www.gerritcodereview.com/2.14.html#21422"
            }
          ]
        },
        "source": {
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
    "assignerShortName": "Google",
    "cveId": "CVE-2020-8920",
    "datePublished": "2020-12-10T10:15:23.000Z",
    "dateReserved": "2020-02-12T00:00:00.000Z",
    "dateUpdated": "2024-08-04T10:12:10.990Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-8919 (GCVE-0-2020-8919)

Vulnerability from cvelistv5 – Published: 2020-12-10 10:15 – Updated: 2024-08-04 10:12
VLAI?
Title
Information leakage in Gerrit
Summary
An information leak vulnerability exists in Gerrit versions prior to 2.15.21, 2.16.25, 3.0.15, 3.1.10, 3.2.5 where a missing access check on the branch REST API allows an attacker with only the default set of priviledges to read all other user's personal account data as well as sub-trees with restricted access.
CWE
Assigner
Impacted products
Vendor Product Version
Gerrit Gerrit Affected: stable , < 2.15.21 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:10.971Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://gerrit.googlesource.com/gerrit/+/0532fb876cb86bc091a91f78e6f28fff9e39ca65"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gerritcodereview.com/2.15.html#21521"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gerritcodereview.com/2.16.html#21625"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gerritcodereview.com/3.0.html#3014"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gerritcodereview.com/3.1.html#3110"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.gerritcodereview.com/3.2.html#325"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Gerrit",
          "vendor": "Gerrit",
          "versions": [
            {
              "changes": [
                {
                  "at": "2.16.25",
                  "status": "unaffected"
                },
                {
                  "at": "3.0.15",
                  "status": "unaffected"
                },
                {
                  "at": "3.1.10",
                  "status": "unaffected"
                },
                {
                  "at": "3.2.5",
                  "status": "unaffected"
                }
              ],
              "lessThan": "2.15.21",
              "status": "affected",
              "version": "stable",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An information leak vulnerability exists in Gerrit versions prior to 2.15.21, 2.16.25, 3.0.15, 3.1.10, 3.2.5 where a missing access check on the branch REST API allows an attacker with only the default set of priviledges to read all other user\u0027s personal account data as well as sub-trees with restricted access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "CWE-285 Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-12-10T10:15:22.000Z",
        "orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
        "shortName": "Google"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://gerrit.googlesource.com/gerrit/+/0532fb876cb86bc091a91f78e6f28fff9e39ca65"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gerritcodereview.com/2.15.html#21521"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gerritcodereview.com/2.16.html#21625"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gerritcodereview.com/3.0.html#3014"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gerritcodereview.com/3.1.html#3110"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.gerritcodereview.com/3.2.html#325"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Information leakage in Gerrit",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2020-8919",
          "STATE": "PUBLIC",
          "TITLE": "Information leakage in Gerrit"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Gerrit",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "stable",
                            "version_value": "2.15.21"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "stable",
                            "version_value": "2.16.25"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "stable",
                            "version_value": "3.0.15"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "stable",
                            "version_value": "3.1.10"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "stable",
                            "version_value": "3.2.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Gerrit"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An information leak vulnerability exists in Gerrit versions prior to 2.15.21, 2.16.25, 3.0.15, 3.1.10, 3.2.5 where a missing access check on the branch REST API allows an attacker with only the default set of priviledges to read all other user\u0027s personal account data as well as sub-trees with restricted access."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-285 Improper Authorization"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gerrit.googlesource.com/gerrit/+/0532fb876cb86bc091a91f78e6f28fff9e39ca65",
              "refsource": "CONFIRM",
              "url": "https://gerrit.googlesource.com/gerrit/+/0532fb876cb86bc091a91f78e6f28fff9e39ca65"
            },
            {
              "name": "https://www.gerritcodereview.com/2.15.html#21521",
              "refsource": "CONFIRM",
              "url": "https://www.gerritcodereview.com/2.15.html#21521"
            },
            {
              "name": "https://www.gerritcodereview.com/2.16.html#21625",
              "refsource": "CONFIRM",
              "url": "https://www.gerritcodereview.com/2.16.html#21625"
            },
            {
              "name": "https://www.gerritcodereview.com/3.0.html#3014",
              "refsource": "CONFIRM",
              "url": "https://www.gerritcodereview.com/3.0.html#3014"
            },
            {
              "name": "https://www.gerritcodereview.com/3.1.html#3110",
              "refsource": "CONFIRM",
              "url": "https://www.gerritcodereview.com/3.1.html#3110"
            },
            {
              "name": "https://www.gerritcodereview.com/3.2.html#325",
              "refsource": "CONFIRM",
              "url": "https://www.gerritcodereview.com/3.2.html#325"
            }
          ]
        },
        "source": {
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
    "assignerShortName": "Google",
    "cveId": "CVE-2020-8919",
    "datePublished": "2020-12-10T10:15:22.000Z",
    "dateReserved": "2020-02-12T00:00:00.000Z",
    "dateUpdated": "2024-08-04T10:12:10.971Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}