First published: Mon Dec 13 2021(Updated: )
In all versions of GitLab CE/EE starting version 14.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, the reset password token and new user email token are accidentally logged which may lead to information disclosure.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.0.0<14.3.6 | |
GitLab | >=14.0.0<14.3.6 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.5.0<14.5.2 | |
GitLab | >=14.5.0<14.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39919 is considered a medium severity vulnerability due to potential information disclosure.
To mitigate CVE-2021-39919, upgrade GitLab to version 14.3.6, 14.4.4, or 14.5.2 or later.
The impact of CVE-2021-39919 includes potential exposure of sensitive reset password tokens and new user email tokens.
CVE-2021-39919 affects all versions of GitLab CE/EE starting from 14.0 before 14.3.6, and from versions 14.4 before 14.4.4 and 14.5 before 14.5.2.
Yes, CVE-2021-39919 can potentially be exploited remotely if the logs containing sensitive information are accessed.