UBUNTU-CVE-2021-39872

Source
https://ubuntu.com/security/CVE-2021-39872
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-39872.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-39872
Related
Published
2021-10-05T13:15:00Z
Modified
2025-01-13T10:22:37Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

In all versions of GitLab CE/EE since version 14.1, an improper access control vulnerability allows users with expired password to still access GitLab through git and API through access tokens acquired before password expiration.

References

Affected packages

Ubuntu:Pro:16.04:LTS / gitlab

Package

Name
gitlab
Purl
pkg:deb/ubuntu/gitlab@8.5.8+dfsg-5?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.4.3+dfsg-9
8.4.3+dfsg-12
8.5.8+dfsg-5

Ecosystem specific

{
    "ubuntu_priority": "medium"
}