First published: Mon Oct 04 2021(Updated: )
In all versions of GitLab CE/EE since version 8.0, when an admin uses the impersonate feature twice and stops impersonating, the admin may be logged in as the second user they impersonated, which may lead to repudiation issues.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.0.0<14.1.7 | |
GitLab | >=8.0.0<14.1.7 | |
GitLab | >=14.2<14.2.5 | |
GitLab | >=14.2<14.2.5 | |
GitLab | >=14.3<14.3.1 | |
GitLab | >=14.3<14.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39896 is considered a medium severity vulnerability due to its potential for repudiation issues.
To fix CVE-2021-39896, upgrade your GitLab installation to version 14.1.8 or later, 14.2.6 or later, or 14.3.2 or later.
CVE-2021-39896 affects all versions of GitLab CE/EE from 8.0 up to and including 14.3.1.
The impact of CVE-2021-39896 can lead to an administrator inadvertently remaining logged in as a different user, which could result in unauthorized actions.
Administrators of GitLab CE/EE installations are primarily affected by CVE-2021-39896 if they use the impersonate feature.