In all versions of GitLab CE/EE since version 7.7, the application may let a malicious user create an OAuth client application with arbitrary scope names which may allow the malicious user to trick unsuspecting users to authorize the malicious client application using the spoofed scope name and description.
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39881.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/26695 | Broken Link |
https://hackerone.com/reports/494530 | Permissions Required Third Party Advisory |
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39881.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/26695 | Broken Link |
https://hackerone.com/reports/494530 | Permissions Required Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39881.json - Vendor Advisory | |
References | () https://gitlab.com/gitlab-org/gitlab/-/issues/26695 - Broken Link | |
References | () https://hackerone.com/reports/494530 - Permissions Required, Third Party Advisory |
Information
Published : 2021-10-05 14:15
Updated : 2024-11-21 06:20
NVD link : CVE-2021-39881
Mitre link : CVE-2021-39881
CVE.ORG link : CVE-2021-39881
JSON object : View
Products Affected
gitlab
- gitlab
CWE