UBUNTU-CVE-2021-22224

Source
https://ubuntu.com/security/CVE-2021-22224
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-22224.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-22224
Upstream
Published
2021-07-07T12:15:00Z
Modified
2025-10-24T04:50:07Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A cross-site request forgery vulnerability in the GraphQL API in GitLab since version 13.12 and before versions 13.12.6 and 14.0.2 allowed an attacker to call mutations as the victim

References

Affected packages

Ubuntu:16.04:LTS / gitlab

Package

Name
gitlab
Purl
pkg:deb/ubuntu/gitlab@8.5.8+dfsg-5?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.4.3+dfsg-9
8.4.3+dfsg-12
8.5.8+dfsg-5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "gitlab",
            "binary_version": "8.5.8+dfsg-5"
        }
    ]
}