CVE-2021-39899Weak Password Recovery Mechanism for Forgotten Password in Gitlab

Severity
4.2MEDIUMNVD
EPSS
0.1%
top 78.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4
Latest updateMay 24

Description

In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.

CVSS vector

CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 0.5 | Impact: 3.6

Affected Packages5 packages

NVDgitlab/gitlab1.0.014.1.7+2
debiandebian/gitlab< gitlab 15.10.8+ds1-2 (sid)
CVEListV5gitlab/gitlab>=1.0, <14.1.7, >=14.2, <14.2.5, >=14.3, <14.3.1+2
gitlabgitlab/gitlab

🔴Vulnerability Details

2
GHSA
GHSA-f3cp-f6ph-xxhj: In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password func2022-05-24
OSV
CVE-2021-39899: In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password func2021-10-04

📋Vendor Advisories

2
GitLab
CVE-2021-39899: In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password func2021-10-04
Debian
CVE-2021-39899: gitlab - In all versions of GitLab CE/EE, an attacker with physical access to a user’s ma...2021