First published: Wed Aug 25 2021(Updated: )
Under specialized conditions, GitLab may allow a user with an impersonation token to perform Git actions even if impersonation is disabled. This vulnerability is present in GitLab CE/EE versions before 13.12.9, 14.0.7, 14.1.2
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.1.0<13.12.9 | |
GitLab | >=13.1.0<13.12.9 | |
GitLab | >=14.0.0<14.0.7 | |
GitLab | >=14.0.0<14.0.7 | |
GitLab | >=14.1.0<14.1.2 | |
GitLab | >=14.1.0<14.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22237 is considered a high-severity vulnerability that allows unauthorized Git actions under specific conditions.
To remediate CVE-2021-22237, upgrade to GitLab versions 13.12.9, 14.0.7, or 14.1.2 or later.
CVE-2021-22237 affects GitLab Community and Enterprise editions prior to the specified patched versions.
An attacker can perform Git actions using an impersonation token even if impersonation is disabled, potentially leading to unauthorized access.
GitLab CE/EE versions before 13.12.9, 14.0.7, and 14.1.2 are vulnerable to CVE-2021-22237.