UBUNTU-CVE-2021-39927

Source
https://ubuntu.com/security/CVE-2021-39927
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-39927.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-39927
Upstream
Published
2022-01-18T17:15:00Z
Modified
2025-07-16T08:15:53.032779Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
  • 3.5 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

Server side request forgery protections in GitLab CE/EE versions between 8.4 and 14.4.4, between 14.5.0 and 14.5.2, and between 14.6.0 and 14.6.1 would fail to protect against attacks sending requests to localhost on port 80 or 443 if GitLab was configured to run on a port other than 80 or 443

References

Affected packages

Ubuntu:Pro:16.04:LTS / gitlab

Package

Name
gitlab
Purl
pkg:deb/ubuntu/gitlab@8.5.8+dfsg-5?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.4.3+dfsg-9
8.4.3+dfsg-12
8.5.8+dfsg-5