First published: Tue Jun 08 2021(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 12.9.0 before 13.10.5, all versions starting from 13.11.0 before 13.11.5, all versions starting from 13.12.0 before 13.12.2. Insufficient expired password validation in various operations allow user to maintain limited access after their password expired
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.9.0<13.10.5 | |
GitLab | >=12.9.0<13.10.5 | |
GitLab | >=13.11.0<13.11.5 | |
GitLab | >=13.11.0<13.11.5 | |
GitLab | >=13.12.0<13.12.2 | |
GitLab | >=13.12.0<13.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22221 is classified as a medium severity vulnerability due to the insufficient validation of expired passwords.
To fix CVE-2021-22221, you should update GitLab to version 13.10.5 or later, 13.11.5 or later, or 13.12.2 or later.
CVE-2021-22221 affects GitLab versions from 12.9.0 before 13.10.5, from 13.11.0 before 13.11.5, and from 13.12.0 before 13.12.2.
Yes, CVE-2021-22221 is present in both the GitLab community and enterprise editions of affected versions.
CVE-2021-22221 is a security vulnerability characterized by inadequate validation of expired passwords allowing limited access.