The Terraform API in GitLab CE/EE 12.10+ exposed the object storage signed URL on the delete operation allowing a malicious project maintainer to overwrite the Terraform state, bypassing audit and other business controls. Affected versions are >=12.10, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.
{
"cpes": [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:12.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.5:*:*:*:enterprise:*:*:*"
],
"severity": "High"
}