First published: Mon Dec 13 2021(Updated: )
Improper access control in GitLab CE/EE affecting all versions starting from 10.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker in possession of a deploy token to access a project's disabled wiki.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.7.0<14.3.6 | |
GitLab | >=10.7.0<14.3.6 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.5.0<14.5.2 | |
GitLab | >=14.5.0<14.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39936 has a moderate severity level due to improper access control that allows unauthorized access to disabled wikis.
To fix CVE-2021-39936, update GitLab to version 14.3.6 or later, 14.4.4 or later, or 14.5.2 or later depending on your current version.
CVE-2021-39936 affects all versions of GitLab CE/EE from 10.7 to before 14.3.6, from 14.4 to before 14.4.4, and from 14.5 to before 14.5.2.
An attacker in possession of a deploy token can exploit CVE-2021-39936 to access a project’s disabled wiki.
CVE-2021-39936 allows unauthorized access to sensitive project information, compromising the integrity and confidentiality of data.