First published: Wed Mar 24 2021(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 allowing unauthorized authenticated users to execute arbitrary code on the server.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.2.0<13.7.9 | |
GitLab | >=13.2.0<13.7.9 | |
GitLab | >=13.8.0<13.8.6 | |
GitLab | >=13.8.0<13.8.6 | |
GitLab | >=13.9.0<13.9.4 | |
GitLab | >=13.9.0<13.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22192 is considered a critical vulnerability due to its potential to allow unauthorized execution of arbitrary code on the server.
To fix CVE-2021-22192, upgrade GitLab to version 13.7.9 or later, or 13.8.6 or later, or 13.9.4 or later, depending on your current version.
CVE-2021-22192 affects GitLab CE/EE versions starting from 13.2 up to 13.9.4.
Yes, CVE-2021-22192 can be exploited by unauthorized authenticated users to execute arbitrary code.
Yes, GitLab has released patches for CVE-2021-22192 in the updated versions of their software.