First published: Mon Apr 12 2021(Updated: )
A path traversal vulnerability via the GitLab Workhorse in all versions of GitLab could result in the leakage of a JWT token
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.7.0<13.7.8 | |
GitLab | >=13.7.0<13.7.8 | |
GitLab | >=13.8.0<13.8.5 | |
GitLab | >=13.8.0<13.8.5 | |
GitLab | >=13.9.0<13.9.2 | |
GitLab | >=13.9.0<13.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22190 has been rated as a medium severity vulnerability.
To fix CVE-2021-22190, upgrade GitLab to version 13.7.9, 13.8.6, or 13.9.3 or later.
CVE-2021-22190 affects GitLab Community and Enterprise Editions from versions 13.7.0 to 13.9.2.
CVE-2021-22190 is a path traversal vulnerability that can lead to the exposure of a JWT token.
CVE-2021-22190 can be exploited by an attacker who sends crafted requests to the GitLab Workhorse that bypasses security restrictions.