First published: Tue Jan 18 2022(Updated: )
In all versions of GitLab CE/EE since version 12.0, a lower privileged user can import users from projects that they don't have a maintainer role on and disclose email addresses of those users.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.0<14.1.7 | |
GitLab | >=12.0<14.1.7 | |
GitLab | >=14.2<14.2.5 | |
GitLab | >=14.2<14.2.5 | |
GitLab | =14.3.0 | |
GitLab | =14.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39892 has been classified as a medium severity vulnerability.
To fix CVE-2021-39892, update your GitLab installation to version 14.3.1 or later.
All versions of GitLab CE and EE from version 12.0 to 14.2.5 are affected by CVE-2021-39892.
CVE-2021-39892 is a privilege escalation vulnerability that allows lower privileged users to import other users.
CVE-2021-39892 allows unauthorized users to disclose the email addresses of users from projects where they lack a maintainer role.