First published: Fri Apr 02 2021(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting with 12.6. Under a special condition it was possible to access data of an internal repository through a public project fork as an anonymous user.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.6.0<13.8.7 | |
GitLab | >=12.6.0<13.8.7 | |
GitLab | >=13.9.0<13.9.5 | |
GitLab | >=13.9.0<13.9.5 | |
GitLab | =13.10.0 | |
GitLab | =13.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22200 is considered a high-severity vulnerability due to the potential for unauthorized data access.
To mitigate CVE-2021-22200, upgrade GitLab to the latest patch version, specifically 13.10.0 or later.
CVE-2021-22200 affects all versions of GitLab CE/EE starting from 12.6.0 up to 13.8.7.
CVE-2021-22200 is categorized as an access control vulnerability.
Yes, CVE-2021-22200 can be exploited by anonymous users who access public project forks.