First published: Thu Aug 05 2021(Updated: )
Improper access control in GitLab EE versions 13.11.6, 13.12.6, and 14.0.2 allows users to be created via single sign on despite user cap being enabled
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.7.0<13.11.6 | |
GitLab | >=13.12.0<13.12.6 | |
GitLab | >=14.0.0<14.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22240 is classified as a high severity vulnerability due to its impact on user access controls.
To fix CVE-2021-22240, upgrade to GitLab EE version 13.11.7, 13.12.7, or 14.0.3 or later.
CVE-2021-22240 affects GitLab EE versions 13.11.6, 13.12.6, and 14.0.2.
Yes, CVE-2021-22240 can potentially be exploited remotely through improper access controls.
CVE-2021-22240 involves improper access control allowing users to bypass restrictions via single sign-on.