Command Injection Vulnerability in GitLab Runner on Windows Systems
CVE-2020-13347
9.1CRITICAL
Summary
A command injection vulnerability exists in GitLab Runner when configured on Windows systems with a Docker executor. This flaw allows an attacker to execute arbitrary commands on the Windows host system by exploiting the DOCKER_AUTH_CONFIG build variable. If implemented incorrectly, the configuration could lead to unauthorized access and complete control over the system, underscoring the importance of applying the latest updates to prevent potential exploitation.
Affected Version(s)
GitLab Runner >=12.0.0, <13.2.4 < 12.0.0, 13.2.4
GitLab Runner >=13.3.0, <13.3.2 < 13.3.0, 13.3.2
GitLab Runner >=13.4.0, <13.4.1 < 13.4.0, 13.4.1
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Thanks [ajxchapman](https://hackerone.com/ajxchapman) for reporting this vulnerability through our HackerOne bug bounty program