First published: Mon Dec 06 2021(Updated: )
It was possible to bypass 2FA for LDAP users and access some specific pages with Basic Authentication in GitLab 14.1.1 and above.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.1.1<14.1.7 | |
GitLab | >=14.2.0<14.2.5 | |
GitLab | =14.3.0 | |
GitLab | =14.3.0 | |
GitLab | =14.3.1 | |
GitLab | =14.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39890 has been classified as a high severity vulnerability due to the potential for bypassing two-factor authentication for LDAP users.
CVE-2021-39890 affects GitLab versions 14.1.1 to 14.1.7, 14.2.0 to 14.2.5, and specifically 14.3.0 to 14.3.1.
To fix CVE-2021-39890, upgrade GitLab to the latest version that is not affected by this vulnerability.
CVE-2021-39890 allows unauthorized access to specific pages by bypassing two-factor authentication, compromising user security.
Using a vulnerable version of GitLab related to CVE-2021-39890 is not safe, and immediate action should be taken to upgrade to mitigate the risk.