First published: Tue Oct 05 2021(Updated: )
The project import/export feature in GitLab 8.9 and greater could be used to obtain otherwise private email addresses
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.9.0<14.0.9 | |
GitLab | >=8.9.0<14.0.9 | |
GitLab | >=14.1.0<14.1.4 | |
GitLab | >=14.1.0<14.1.4 | |
GitLab | >=14.2.0<14.2.2 | |
GitLab | >=14.2.0<14.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22258 is classified as a high severity vulnerability due to its potential to expose private email addresses.
To fix CVE-2021-22258, upgrade your GitLab instance to version 14.0.9 or later, or the relevant patched versions.
CVE-2021-22258 affects GitLab versions from 8.9.0 up to, but not including, 14.0.9, as well as 14.1.0 to 14.1.4 and 14.2.0 to 14.2.2.
CVE-2021-22258 could allow unauthorized access to private email addresses associated with projects in GitLab.
There are no known workarounds for CVE-2021-22258, so upgrading to a safe version is the recommended action.