First published: Tue Jul 06 2021(Updated: )
Under certain conditions, some users were able to push to protected branches that were restricted to deploy keys in GitLab CE/EE since version 13.9
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.9.0<13.11.6 | |
GitLab | >=13.9.0<13.11.6 | |
GitLab | >=13.12.0<13.12.6 | |
GitLab | >=13.12.0<13.12.6 | |
GitLab | >=14.0.0<14.0.2 | |
GitLab | >=14.0.0<14.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22226 has a medium severity level due to the potential for unauthorized access to protected branches.
To fix CVE-2021-22226, upgrade your GitLab installation to version 13.11.6 or later, or 14.0.2 or later.
CVE-2021-22226 affects GitLab Community and Enterprise Editions from versions 13.9.0 to 13.11.6 and from 13.12.0 to 13.12.6, as well as 14.0.0 to 14.0.2.
CVE-2021-22226 allows certain users to push to protected branches, potentially compromising the repository integrity.
Users with permissions to push to protected branches in affected versions of GitLab may exploit CVE-2021-22226.