CVE-2021-22213

Source
https://cve.org/CVERecord?id=CVE-2021-22213
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-22213.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-22213
Aliases
Downstream
Published
2021-06-08T19:15:07.973Z
Modified
2026-03-14T11:42:59.558655Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A cross-site leak vulnerability in the OAuth flow of all versions of GitLab CE/EE since 7.10 allowed an attacker to leak an OAuth access token by getting the victim to visit a malicious page with Safari

References

Affected packages

Git / gitlab.com/gitlab-org/gitlab

Affected ranges

Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "7.10.0"
        },
        {
            "fixed": "13.10.5"
        },
        {
            "introduced": "7.10.0"
        },
        {
            "fixed": "13.10.5"
        },
        {
            "introduced": "13.11.0"
        },
        {
            "fixed": "13.11.5"
        },
        {
            "introduced": "13.11.0"
        },
        {
            "fixed": "13.11.5"
        },
        {
            "introduced": "13.12.0"
        },
        {
            "fixed": "13.12.2"
        },
        {
            "introduced": "13.12.0"
        },
        {
            "fixed": "13.12.2"
        }
    ]
}

Affected versions

v13.*
v13.11.0-ee
v13.11.1-ee
v13.11.2-ee
v13.11.3-ee
v13.11.4-ee
v13.12.0-ee
v13.12.1-ee

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-22213.json"