First published: Fri Apr 02 2021(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7.9 before 13.8.7, all versions starting from 13.9 before 13.9.5, and all versions starting from 13.10 before 13.10.1. A specially crafted Wiki page allowed attackers to read arbitrary files on the server.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.7.9<13.8.7 | |
GitLab | >=13.7.9<13.8.7 | |
GitLab | >=13.9.0<13.9.5 | |
GitLab | >=13.9.0<13.9.5 | |
GitLab | =13.10.0 | |
GitLab | =13.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22203 is considered a high-severity vulnerability due to the potential for unauthorized file access on the server.
To fix CVE-2021-22203, upgrade GitLab to versions 13.8.7, 13.9.5, or 13.10.1 or later.
CVE-2021-22203 allows attackers to read arbitrary files on the server through a specially crafted Wiki page.
CVE-2021-22203 affects GitLab CE/EE versions from 13.7.9 before 13.8.7, 13.9 before 13.9.5, and 13.10 before 13.10.1.
No, if you are using GitLab versions 13.8.7, 13.9.5, or 13.10.1 and above, then your instance is not vulnerable to CVE-2021-22203.