First published: Tue Oct 05 2021(Updated: )
In all versions of GitLab CE/EE since version 8.0, access tokens created as part of admin's impersonation of a user are not cleared at the end of impersonation which may lead to unnecessary sensitive info disclosure.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.0.0<14.1.7 | |
GitLab | >=8.0.0<14.1.7 | |
GitLab | >=14.2.0<14.2.5 | |
GitLab | >=14.2.0<14.2.5 | |
GitLab | >=14.3.0<14.3.1 | |
GitLab | >=14.3.0<14.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39891 is considered a Medium severity vulnerability due to potential sensitive information disclosure.
To fix CVE-2021-39891, upgrade to GitLab version 14.1.8, 14.2.6, or 14.3.2 and ensure access tokens are properly cleared.
CVE-2021-39891 affects all GitLab CE/EE versions from 8.0.0 up to 14.1.7, as well as specific versions in the 14.2.x and 14.3.x ranges.
Access tokens are credentials used to authenticate user sessions and control access to resources, which if not cleared can lead to data exposure.
Administrators who impersonate users in GitLab are primarily impacted, as their access tokens may remain active post-impersonation.