First published: Wed Feb 09 2022(Updated: )
An authorization logic error in the External Status Check API in GitLab EE affecting all versions starting from 14.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allowed a user to update the status of the check via an API call
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.1.0<14.3.6 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.5.0<14.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39943 is classified as a medium severity vulnerability due to its potential impact on user authorization.
CVE-2021-39943 affects GitLab EE versions starting from 14.1 before 14.3.6, from 14.4 before 14.4.4, and from 14.5 before 14.5.2.
To fix CVE-2021-39943, upgrade GitLab EE to version 14.3.6 or later, 14.4.4 or later, or 14.5.2 or later.
CVE-2021-39943 can allow unauthorized users to update the status of checks via an API call, which could lead to manipulation of critical workflows.
There is no official workaround for CVE-2021-39943; the recommended action is to apply the necessary updates as soon as possible.