First published: Mon Dec 13 2021(Updated: )
Lack of an access control check in the External Status Check feature allowed any authenticated user to retrieve the configuration of any External Status Check in GitLab EE starting from 14.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.1.0<14.3.6 | |
GitLab | >=14.1.0<14.3.6 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.5.0<14.5.2 | |
GitLab | >=14.5.0<14.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39916 has a medium severity level due to the potential exposure of sensitive configuration information.
To fix CVE-2021-39916, upgrade GitLab to version 14.3.6 or later, or to version 14.4.4 or later, or to version 14.5.2 or later.
CVE-2021-39916 affects GitLab versions starting from 14.1 up to 14.3.6, from 14.4 up to 14.4.4, and from 14.5 up to 14.5.2.
The impact of CVE-2021-39916 allows authenticated users to retrieve the configuration settings of any External Status Check without appropriate access controls.
Any authenticated user can exploit CVE-2021-39916 due to the lack of proper access control checks in the affected feature.