In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39899.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/339154 | Broken Link |
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39899.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/339154 | Broken Link |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:20
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 1.9
v3 : 2.9 |
References | () https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39899.json - Vendor Advisory | |
References | () https://gitlab.com/gitlab-org/gitlab/-/issues/339154 - Broken Link |
Information
Published : 2021-10-04 17:15
Updated : 2024-11-21 06:20
NVD link : CVE-2021-39899
Mitre link : CVE-2021-39899
CVE.ORG link : CVE-2021-39899
JSON object : View
Products Affected
gitlab
- gitlab
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password