First published: Thu May 24 2018(Updated: )
GitLab Community and Enterprise Editions before 10.1.6, 10.2.6, and 10.3.4 are vulnerable to an unverified password change issue in the PasswordsController component resulting in potential account takeover if a victim's session is compromised.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <10.1.6 | |
GitLab | <10.1.6 | |
GitLab | >=10.2.0<10.2.6 | |
GitLab | >=10.2.0<10.2.6 | |
GitLab | >=10.3.0<10.3.4 | |
GitLab | >=10.3.0<10.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0921 has been classified as a high severity vulnerability due to the potential for account takeover if a session is compromised.
To fix CVE-2017-0921, upgrade your GitLab installation to version 10.1.6, 10.2.6, or 10.3.4 or later.
CVE-2017-0921 affects GitLab Community and Enterprise Editions prior to version 10.1.6, 10.2.6, and 10.3.4.
CVE-2017-0921 affects the PasswordsController component in GitLab.
The potential impact of CVE-2017-0921 includes unauthorized account access and account takeover.