First published: Fri Jan 15 2021(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 12.1. Incorrect headers in specific project page allows attacker to have a temporary read access to the private repository
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.1.0<13.5.6 | |
GitLab | >=12.1.0<13.5.6 | |
GitLab | >=13.6.0<13.6.4 | |
GitLab | >=13.6.0<13.6.4 | |
GitLab | >=13.7.0<13.7.2 | |
GitLab | >=13.7.0<13.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22167 is considered to have a medium severity level.
To fix CVE-2021-22167, users should upgrade GitLab to version 13.5.6 or later, or to version 13.6.4 or later, or to version 13.7.2 or later.
CVE-2021-22167 affects all GitLab versions starting from 12.1.0 up to but not including 13.5.6, as well as specific ranges in 13.6.x and 13.7.x.
CVE-2021-22167 allows an attacker to gain temporary read access to private repositories due to incorrect headers on certain project pages.
Yes, CVE-2021-22167 affects both GitLab Community and Enterprise editions.