CVE-2021-39881

In all versions of GitLab CE/EE since version 7.7, the application may let a malicious user create an OAuth client application with arbitrary scope names which may allow the malicious user to trick unsuspecting users to authorize the malicious client application using the spoofed scope name and description.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 06:20

Type Values Removed Values Added
References () https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39881.json - Vendor Advisory () https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39881.json - Vendor Advisory
References () https://gitlab.com/gitlab-org/gitlab/-/issues/26695 - Broken Link () https://gitlab.com/gitlab-org/gitlab/-/issues/26695 - Broken Link
References () https://hackerone.com/reports/494530 - Permissions Required, Third Party Advisory () https://hackerone.com/reports/494530 - Permissions Required, Third Party Advisory

Information

Published : 2021-10-05 14:15

Updated : 2024-11-21 06:20


NVD link : CVE-2021-39881

Mitre link : CVE-2021-39881

CVE.ORG link : CVE-2021-39881


JSON object : View

Products Affected

gitlab

  • gitlab