First published: Tue Jun 08 2021(Updated: )
All versions of GitLab CE/EE starting from 9.5 before 13.10.5, all versions starting from 13.11 before 13.11.5, and all versions starting from 13.12 before 13.12.2 allow a high privilege user to obtain sensitive information from log files because the sensitive information was not correctly registered for log masking.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=9.5.0<13.10.5 | |
GitLab | >=9.5.0<13.10.5 | |
GitLab | >=13.11.0<13.11.5 | |
GitLab | >=13.11.0<13.11.5 | |
GitLab | >=13.12.0<13.12.2 | |
GitLab | >=13.12.0<13.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22219 has been classified with a high severity due to its potential to expose sensitive information.
To fix CVE-2021-22219, upgrade GitLab to version 13.10.5, 13.11.5, or 13.12.2, depending on your current version.
CVE-2021-22219 affects all versions of GitLab CE/EE from 9.5 before 13.10.5, from 13.11 before 13.11.5, and from 13.12 before 13.12.2.
CVE-2021-22219 allows high privilege users to obtain sensitive information from log files.
CVE-2021-22219 is considered a local vulnerability, as it requires high privilege access to exploit.