First published: Fri Apr 23 2021(Updated: )
GitHub Community and Enterprise Editions that utilize the ability to upload images through GitLab Workhorse are vulnerable to remote code execution. Workhorse passes image file extensions through ExifTool, which improperly validates the image files.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.9.0<13.8.8 | |
GitLab | >=11.9.0<13.8.8 | |
GitLab | >=13.9.0<13.9.6 | |
GitLab | >=13.9.0<13.9.6 | |
GitLab | >=13.10.0<13.10.3 | |
GitLab | >=13.10.0<13.10.3 | |
GitLab |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22205 is classified as critical due to its potential for remote code execution.
To remediate CVE-2021-22205, upgrade GitLab Community and Enterprise Editions to versions 13.10.3, 13.9.6, or 13.8.8 or later.
CVE-2021-22205 affects GitLab versions ranging from 11.9.0 to 13.8.8 and some versions between 13.9.0 to 13.9.6 and 13.10.0 to 13.10.3.
CVE-2021-22205 is a remote code execution vulnerability due to improper validation of image file extensions.
Organizations using GitLab Community and Enterprise Editions with the image upload feature enabled are vulnerable to CVE-2021-22205.