First published: Tue Oct 05 2021(Updated: )
In all versions of GitLab EE since version 14.1, due to an insecure direct object reference vulnerability, an endpoint may reveal the protected branch name to a malicious user who makes a crafted API call with the ID of the protected branch.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.1.0<14.1.7 | |
GitLab | >=14.2.0<14.2.5 | |
GitLab | >=14.3.0<14.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39889 has been classified as a medium severity vulnerability.
To mitigate CVE-2021-39889, upgrade to GitLab EE version 14.1.7, 14.2.6, or 14.3.2 or later.
CVE-2021-39889 could allow unauthorized users to discover the names of protected branches through crafted API calls.
CVE-2021-39889 affects GitLab EE versions 14.1.0 to 14.1.6, 14.2.0 to 14.2.5, and 14.3.0 to 14.3.1.
Users of GitLab EE versions listed in the vulnerability's range are at risk of exposing protected branch names to malicious actors.