First published: Mon Dec 13 2021(Updated: )
Improper access control in the GraphQL API in GitLab CE/EE affecting all versions starting from 13.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker to see the names of project access tokens on arbitrary projects
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.0.0<14.3.6 | |
GitLab | >=13.0.0<14.3.6 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.5.0<14.5.2 | |
GitLab | >=14.5.0<14.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39915 has been rated as a medium severity vulnerability due to improper access control allowing unauthorized access to project access token names.
To fix CVE-2021-39915, upgrade your GitLab installation to version 14.3.6 or above, 14.4.4 or above, or 14.5.2 or above.
CVE-2021-39915 affects GitLab CE/EE versions starting from 13.0 before 14.3.6, 14.4 before 14.4.4, and 14.5 before 14.5.2.
The potential impact of CVE-2021-39915 includes exposure of project access token names, which could facilitate further attacks.
There have been no confirmed reports of CVE-2021-39915 being actively exploited in the wild, but it is advisable to apply patches promptly.