CVE-2021-39899

EUVD-2021-26255
In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
2.9 LOW
PHYSICAL
HIGH
NONE
CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
GitLabCNA
2.9 LOW
PHYSICAL
HIGH
NONE
CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
Affected Products (NVD)
VendorProductVersion
gitlabgitlab
1.0.0 ≤
𝑥
< 14.1.7
gitlabgitlab
1.0.0 ≤
𝑥
< 14.1.7
gitlabgitlab
14.2 ≤
𝑥
< 14.2.5
gitlabgitlab
14.2 ≤
𝑥
< 14.2.5
gitlabgitlab
14.3 ≤
𝑥
< 14.3.1
gitlabgitlab
14.3 ≤
𝑥
< 14.3.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gitlab
sid
16.8.4-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gitlab
bionic
dne
focal
dne
hirsute
dne
impish
dne
jammy
dne
kinetic
dne
lunar
dne
mantic
dne
noble
dne
trusty
dne
xenial
ignored