UBUNTU-CVE-2021-39881

Source
https://ubuntu.com/security/CVE-2021-39881
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-39881.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-39881
Related
Published
2021-10-05T14:15:00Z
Modified
2025-01-13T10:22:37Z
Severity
  • 3.5 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

In all versions of GitLab CE/EE since version 7.7, the application may let a malicious user create an OAuth client application with arbitrary scope names which may allow the malicious user to trick unsuspecting users to authorize the malicious client application using the spoofed scope name and description.

References

Affected packages

Ubuntu:Pro:16.04:LTS / gitlab

Package

Name
gitlab
Purl
pkg:deb/ubuntu/gitlab@8.5.8+dfsg-5?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.4.3+dfsg-9
8.4.3+dfsg-12
8.5.8+dfsg-5

Ecosystem specific

{
    "ubuntu_priority": "medium"
}