CVE-2021-39889Authorization Bypass Through User-Controlled Key in Gitlab

Severity
4.3MEDIUMNVD
EPSS
0.2%
top 52.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 5
Latest updateMay 24

Description

In all versions of GitLab EE since version 14.1, due to an insecure direct object reference vulnerability, an endpoint may reveal the protected branch name to a malicious user who makes a crafted API call with the ID of the protected branch.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages5 packages

NVDgitlab/gitlab14.1.014.1.7+2
CVEListV5gitlab/gitlab>=14.1, <14.1.7, >=14.2, <14.2.5, >=14.3, <14.3.1+2
debiandebian/gitlab
gitlabgitlab/gitlab

🔴Vulnerability Details

2
GHSA
GHSA-7w9g-7w46-w7h4: In all versions of GitLab EE since version 142022-05-24
OSV
CVE-2021-39889: In all versions of GitLab EE since version 142021-10-05

📋Vendor Advisories

2
GitLab
CVE-2021-39889: In all versions of GitLab EE since version 14.1, due to an insecure direct object reference vulnerability, an endpoint may reveal the protected branch2021-10-05
Debian
CVE-2021-39889: gitlab - In all versions of GitLab EE since version 14.1, due to an insecure direct objec...2021