First published: Tue Oct 05 2021(Updated: )
Missing access control in all GitLab versions starting from 13.12 before 14.0.9, all versions starting from 14.1 before 14.1.4, and all versions starting from 14.2 before 14.2.2 with Jira Cloud integration enabled allows Jira users without administrative privileges to add and remove Jira Connect Namespaces via the GitLab.com for Jira Cloud application configuration page
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.12.0<14.0.9 | |
GitLab | >=13.12.0<14.0.9 | |
GitLab | >=14.1.0<14.1.4 | |
GitLab | >=14.1.0<14.1.4 | |
GitLab | >=14.2.0<14.2.2 | |
GitLab | >=14.2.0<14.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22262 is rated as a medium severity vulnerability.
To fix CVE-2021-22262, upgrade GitLab to version 14.0.9 or later, 14.1.4 or later, or 14.2.2 or later.
CVE-2021-22262 affects all GitLab versions starting from 13.12 before 14.0.9, from 14.1 before 14.1.4, and from 14.2 before 14.2.2.
CVE-2021-22262 allows Jira users without administrative privileges to improperly add and remove Jira Connect names.
Currently, there is no documented workaround for CVE-2021-22262, and upgrading is the recommended solution.