First published: Fri Aug 20 2021(Updated: )
Under very specific conditions a user could be impersonated using Gitlab shell. This vulnerability affects GitLab CE/EE 13.1 and later through 14.1.2, 14.0.7 and 13.12.9.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.1.0<13.12.9 | |
GitLab | >=13.1.0<13.12.9 | |
GitLab | >=14.0.0<14.0.7 | |
GitLab | >=14.0.0<14.0.7 | |
GitLab | >=14.1.0<14.1.2 | |
GitLab | >=14.1.0<14.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22254 is considered a high severity vulnerability due to the potential for user impersonation under specific conditions.
To fix CVE-2021-22254, users should upgrade to GitLab versions 14.1.3, 14.0.8, or 13.12.10 or later.
CVE-2021-22254 affects GitLab CE/EE versions between 13.1.0 and 13.12.9, as well as versions 14.0.0 to 14.0.7 and 14.1.0 to 14.1.2.
The impact of CVE-2021-22254 allows an attacker to impersonate another user, which can lead to unauthorized access and control over accounts.
CVE-2021-22254 was disclosed in 2021 as part of GitLab's vulnerability management process.