CVE-2021-39899

In all versions of GitLab CE/EE, an attacker with physical access to a users machine may brute force the users password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
2.9 LOW
PHYSICAL
HIGH
NONE
CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
GitLabCNA
2.9 LOW
PHYSICAL
HIGH
NONE
CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 22%
VendorProductVersion
gitlabgitlab
1.0.0 ≤
𝑥
< 14.1.7
gitlabgitlab
1.0.0 ≤
𝑥
< 14.1.7
gitlabgitlab
14.2 ≤
𝑥
< 14.2.5
gitlabgitlab
14.2 ≤
𝑥
< 14.2.5
gitlabgitlab
14.3 ≤
𝑥
< 14.3.1
gitlabgitlab
14.3 ≤
𝑥
< 14.3.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gitlab
sid
16.8.4-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gitlab
noble
dne
mantic
dne
lunar
dne
kinetic
dne
jammy
dne
impish
dne
hirsute
dne
focal
dne
bionic
dne
xenial
ignored
trusty
dne