CVE-2021-39881

In all versions of GitLab CE/EE since version 7.7, the application may let a malicious user create an OAuth client application with arbitrary scope names which may allow the malicious user to trick unsuspecting users to authorize the malicious client application using the spoofed scope name and description.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

History

09 Oct 2021, 03:31

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References (MISC) https://gitlab.com/gitlab-org/gitlab/-/issues/26695 - (MISC) https://gitlab.com/gitlab-org/gitlab/-/issues/26695 - Broken Link
References (CONFIRM) https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39881.json - (CONFIRM) https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39881.json - Vendor Advisory
References (MISC) https://hackerone.com/reports/494530 - (MISC) https://hackerone.com/reports/494530 - Permissions Required, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 3.5
v3 : 3.5
CPE cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*

05 Oct 2021, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-05 14:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-39881

Mitre link : CVE-2021-39881

CVE.ORG link : CVE-2021-39881


JSON object : View

Products Affected

gitlab

  • gitlab