First published: Fri Mar 26 2021(Updated: )
Improper authorization in GitLab 12.8+ allows a guest user in a private project to view tag data that should be inaccessible on the releases page
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.8.0<13.6.6 | |
GitLab | >=12.8.0<13.6.6 | |
GitLab | >=13.7.0<13.7.6 | |
GitLab | >=13.7.0<13.7.6 | |
GitLab | >=13.8.0<13.8.2 | |
GitLab | >=13.8.0<13.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22172 has a medium severity rating due to improper authorization vulnerabilities impacting GitLab users.
To fix CVE-2021-22172, you need to update GitLab to version 13.8.2 or later.
CVE-2021-22172 affects GitLab versions 12.8.0 to 13.6.6 for both community and enterprise editions.
CVE-2021-22172 allows guest users in a private project to view tag data that should be restricted, potentially exposing sensitive information.
CVE-2021-22172 was disclosed in early 2021, highlighting security issues in certain versions of GitLab.