CVE-2021-39895 — Sensitive Information Exposure in Gitlab
5 documents5 sources
Severity
4.5MEDIUMNVD
EPSS
0.3%
top 48.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 5
Latest updateMay 24
Description
In all versions of GitLab CE/EE since version 8.0, an attacker can set the pipeline schedules to be active in a project export so when an unsuspecting owner imports that project, pipelines are active by default on that project. Under specialized conditions, this may lead to information disclosure if the project is imported from an untrusted source.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:NExploitability: 0.9 | Impact: 3.6
Affected Packages5 packages
🔴Vulnerability Details
2📋Vendor Advisories
2GitLab▶
CVE-2021-39895: In all versions of GitLab CE/EE since version 8.0, an attacker can set the pipeline schedules to be active in a project export so when an unsuspecting↗2021-11-05
Debian▶
CVE-2021-39895: gitlab - In all versions of GitLab CE/EE since version 8.0, an attacker can set the pipel...↗2021