First published: Fri Jan 15 2021(Updated: )
Insufficient validation of authentication parameters in GitLab Pages for GitLab 11.5+ allows an attacker to steal a victim's API token if they click on a maliciously crafted link
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.5.0<13.5.6 | |
GitLab | >=11.5.0<13.5.6 | |
GitLab | >=13.6.0<13.6.4 | |
GitLab | >=13.6.0<13.6.4 | |
GitLab | >=13.7.0<13.7.2 | |
GitLab | >=13.7.0<13.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22171 has a high severity rating due to its potential to allow API token theft.
To fix CVE-2021-22171, upgrade your GitLab installation to version 13.5.6 or above, or to version 13.6.4 or above, depending on your current version.
CVE-2021-22171 affects both GitLab Community Edition and GitLab Enterprise Edition versions from 11.5.0 to 13.7.2.
CVE-2021-22171 exploits insufficient validation of authentication parameters, allowing attackers to manipulate links to steal API tokens.
The impact of CVE-2021-22171 includes the potential unauthorized access to user accounts and data due to stolen API tokens.