First published: Mon Oct 04 2021(Updated: )
Information disclosure from SendEntry in GitLab starting with 10.8 allowed exposure of full URL of artifacts stored in object-storage with a temporary availability via Rails logs.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.8.0<14.1.7 | |
GitLab | >=10.8.0<14.1.7 | |
GitLab | >=14.2.0<14.2.5 | |
GitLab | >=14.2.0<14.2.5 | |
GitLab | =14.3.0 | |
GitLab | =14.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39900 is classified as a medium severity vulnerability.
To fix CVE-2021-39900, upgrade GitLab to a version above 14.2.5 or 14.3.0.
CVE-2021-39900 allows information disclosure of full URLs for artifacts stored in object storage.
CVE-2021-39900 affects GitLab versions from 10.8.0 up to 14.1.7 and 14.2.0 up to 14.2.5.
CVE-2021-39900 does not require network access to exploit as it involves exposure through Rails logs.