First published: Thu Nov 04 2021(Updated: )
Incorrect Authorization in GitLab CE/EE 13.4 or above allows a user with guest membership in a project to modify the severity of an incident.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.4.0<14.2.6 | |
GitLab | >=13.4.0<14.2.6 | |
GitLab | >=14.3.0<14.3.4 | |
GitLab | >=14.3.0<14.3.4 | |
GitLab | =14.4.0 | |
GitLab | =14.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39902 is classified as a critical vulnerability due to incorrect authorization allowing unauthorized modifications to incident severities.
To fix CVE-2021-39902, update GitLab to version 14.4.0 or later, or to versions 13.4.6 or 14.2.6 if using earlier versions.
Users with guest membership in GitLab projects utilizing versions 13.4.0 through 14.3.4 are affected by CVE-2021-39902.
CVE-2021-39902 allows an attacker with guest access to change the severity level of incidents within a GitLab project.
CVE-2021-39902 was discovered and reported in 2021, affecting multiple versions of GitLab.