CVE-2021-39895Sensitive Information Exposure in Gitlab

5 documents5 sources
Severity
4.5MEDIUMNVD
EPSS
0.3%
top 48.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 5
Latest updateMay 24

Description

In all versions of GitLab CE/EE since version 8.0, an attacker can set the pipeline schedules to be active in a project export so when an unsuspecting owner imports that project, pipelines are active by default on that project. Under specialized conditions, this may lead to information disclosure if the project is imported from an untrusted source.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:NExploitability: 0.9 | Impact: 3.6

Affected Packages5 packages

NVDgitlab/gitlab8.0.014.1.7+2
debiandebian/gitlab< gitlab 15.10.8+ds1-2 (sid)
CVEListV5gitlab/gitlab>=14.2, <14.2.5, >=14.3, <14.3.1, >=8.0, <14.1.7+2
gitlabgitlab/gitlab

🔴Vulnerability Details

2
GHSA
GHSA-c3rv-jv45-94rx: In all versions of GitLab CE/EE since version 82022-05-24
OSV
CVE-2021-39895: In all versions of GitLab CE/EE since version 82021-11-05

📋Vendor Advisories

2
GitLab
CVE-2021-39895: In all versions of GitLab CE/EE since version 8.0, an attacker can set the pipeline schedules to be active in a project export so when an unsuspecting2021-11-05
Debian
CVE-2021-39895: gitlab - In all versions of GitLab CE/EE since version 8.0, an attacker can set the pipel...2021