First published: Wed Aug 25 2021(Updated: )
Improper authorization in GitLab CE/EE affecting all versions since 13.3 allowed users to view and delete impersonation tokens that administrators created for their account
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.3.0<13.12.9 | |
GitLab | >=13.3.0<13.12.9 | |
GitLab | >=14.0.0<14.0.7 | |
GitLab | >=14.0.0<14.0.7 | |
GitLab | >=14.1.0<14.1.2 | |
GitLab | >=14.1.0<14.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22250 is rated as a high severity vulnerability due to improper authorization allowing unauthorized access to impersonation tokens.
To fix CVE-2021-22250, upgrade to GitLab versions 13.12.10, 14.0.8, or 14.1.3 or later.
CVE-2021-22250 affects all versions of GitLab CE and EE from version 13.3 to 14.1.2.
CVE-2021-22250 allows unauthorized users to view and delete impersonation tokens created by administrators.
The impact of CVE-2021-22250 includes the potential for unauthorized users to compromise the security of administrator impersonation tokens.