First published: Thu Nov 04 2021(Updated: )
Accidental logging of system root password in the migration log in all versions of GitLab CE/EE before 14.2.6, all versions starting from 14.3 before 14.3.4, and all versions starting from 14.4 before 14.4.1 allows an attacker with local file system access to obtain system root-level privileges
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | <14.2.6 | |
GitLab GitLab | <14.2.6 | |
GitLab GitLab | >=14.3.0<14.3.4 | |
GitLab GitLab | >=14.3.0<14.3.4 | |
Gitlab Gitlab | =14.4.0 | |
Gitlab Gitlab | =14.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39913 is a vulnerability in GitLab CE/EE that allows an attacker with local file system access to obtain system root-level privileges.
All versions of GitLab CE/EE before 14.2.6, all versions starting from 14.3 before 14.3.4, and all versions starting from 14.4 before 14.4.1 are affected by CVE-2021-39913.
CVE-2021-39913 has a severity value of 6.7 (high).
An attacker with local file system access can exploit CVE-2021-39913 to obtain system root-level privileges by accessing the accidental logging of the system root password in the migration log.
You can find more information about CVE-2021-39913 at the following references: [link1](https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39913.json) and [link2](https://gitlab.com/gitlab-org/gitlab/-/issues/28074).