Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-39899


In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.


Published

2021-10-04T17:15:08.357

Last Modified

2024-11-21T06:20:30.460

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 2.9 (LOW)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

3.4

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-640

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application gitlab gitlab < 14.1.7 Yes
Application gitlab gitlab < 14.1.7 Yes
Application gitlab gitlab < 14.2.5 Yes
Application gitlab gitlab < 14.2.5 Yes
Application gitlab gitlab < 14.3.1 Yes
Application gitlab gitlab < 14.3.1 Yes

References