The Terraform API in GitLab CE/EE 12.10+ exposed the object storage signed URL on the delete operation allowing a malicious project maintainer to overwrite the Terraform state, bypassing audit and other business controls. Affected versions are >=12.10, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.
{ "severity": "High", "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:12.10:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:12.10:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.4:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.5:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.5:*:*:*:enterprise:*:*:*" ] }