First published: Thu May 06 2021(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.8. GitLab was not properly validating authorisation tokens which resulted in GraphQL mutation being executed.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.8.0<13.9.7 | |
GitLab | >=13.8.0<13.9.7 | |
GitLab | >=13.10.0<13.10.4 | |
GitLab | >=13.10.0<13.10.4 | |
GitLab | >=13.11.0<13.11.2 | |
GitLab | >=13.11.0<13.11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22209 has been classified as a high severity vulnerability.
To fix CVE-2021-22209, upgrade GitLab to version 13.9.7 or later for affected versions.
CVE-2021-22209 affects both GitLab Community Edition and Enterprise Edition versions from 13.8.0 to 13.9.7, and also certain versions in the 13.10.x and 13.11.x series.
The cause of CVE-2021-22209 is improper validation of authorization tokens in GitLab.
Yes, CVE-2021-22209 allows unauthorized execution of GraphQL mutations due to the validation issue.