First published: Mon Dec 13 2021(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.5.0<14.3.6 | |
GitLab | >=10.5.0<14.3.6 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.5.0<14.5.2 | |
GitLab | >=14.5.0<14.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39935 has been rated as a high severity vulnerability due to its potential for unauthorized access.
To remediate CVE-2021-39935, update GitLab to version 14.3.6 or later, 14.4.4 or later, or 14.5.2 or later.
CVE-2021-39935 affects all GitLab CE/EE versions starting from 10.5.0 to 14.3.6, and certain versions in the 14.4.x and 14.5.x series.
The impact of CVE-2021-39935 allows unauthorized external users to perform Server Side Requests via the CI Lint API.
There is no known workaround for CVE-2021-39935; the recommended solution is to upgrade to a patched version of GitLab.