CVE-2021-39899 — Weak Password Recovery Mechanism for Forgotten Password in Gitlab
Severity
4.2MEDIUMNVD
EPSS
0.1%
top 78.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 4
Latest updateMay 24
Description
In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.
CVSS vector
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 0.5 | Impact: 3.6
Affected Packages5 packages
🔴Vulnerability Details
2GHSA▶
GHSA-f3cp-f6ph-xxhj: In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password func↗2022-05-24
OSV▶
CVE-2021-39899: In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password func↗2021-10-04
📋Vendor Advisories
2GitLab▶
CVE-2021-39899: In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password func↗2021-10-04
Debian▶
CVE-2021-39899: gitlab - In all versions of GitLab CE/EE, an attacker with physical access to a user’s ma...↗2021