First published: Wed Aug 25 2021(Updated: )
Improper authorization in GitLab CE/EE affecting all versions since 12.6 allowed guest users to create issues for Sentry errors and track their status
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.6.0<13.12.9 | |
GitLab | >=12.6.0<13.12.9 | |
GitLab | >=14.0.0<14.0.7 | |
GitLab | >=14.0.0<14.0.7 | |
GitLab | >=14.1.0<14.1.2 | |
GitLab | >=14.1.0<14.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22256 has been classified with a medium severity due to improper authorization allowing guest users to create issues.
To remediate CVE-2021-22256, you should upgrade GitLab to version 13.12.10 or 14.0.8 and later versions that include the security fix.
CVE-2021-22256 affects all GitLab CE and EE versions from 12.6.0 up to but not including specific patched versions.
Guest users are specifically impacted by CVE-2021-22256, being able to create and track Sentry error issues.
CVE-2021-22256 is not persistent as it can be resolved by upgrading to the recommended versions without the vulnerability.