First published: Tue Oct 05 2021(Updated: )
In all versions of GitLab CE/EE since version 7.7, the application may let a malicious user create an OAuth client application with arbitrary scope names which may allow the malicious user to trick unsuspecting users to authorize the malicious client application using the spoofed scope name and description.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=7.7.0<14.1.7 | |
GitLab GitLab | >=7.7.0<14.1.7 | |
GitLab GitLab | >=14.2.0<14.2.5 | |
GitLab GitLab | >=14.2.0<14.2.5 | |
GitLab GitLab | >=14.3.0<14.3.1 | |
GitLab GitLab | >=14.3.0<14.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39881 is a vulnerability in GitLab CE/EE that allows a malicious user to create an OAuth client application with arbitrary scope names, potentially tricking unsuspecting users.
All versions of GitLab CE/EE since version 7.7 up to version 14.3.1 are affected by CVE-2021-39881.
CVE-2021-39881 has a severity rating of 3.5, which is considered low.
A malicious user can exploit CVE-2021-39881 by creating an OAuth client application with spoofed scope names, tricking unsuspecting users into authorizing the application.
Yes, GitLab has provided a fix for CVE-2021-39881. It is recommended to update to the latest version of GitLab CE/EE to mitigate the vulnerability.