Lucene search

K
cvelistGitLabCVELIST:CVE-2021-39899
HistoryOct 04, 2021 - 4:47 p.m.

CVE-2021-39899

2021-10-0416:47:01
GitLab
www.cve.org
5
gitlab ce
gitlab ee
brute force
password
physical compromise
session id
ip addresses

CVSS3

2.9

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N

AI Score

4.5

Confidence

High

EPSS

0.001

Percentile

32.1%

In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.

CNA Affected

[
  {
    "product": "GitLab",
    "vendor": "GitLab",
    "versions": [
      {
        "status": "affected",
        "version": ">=1.0, <14.1.7"
      },
      {
        "status": "affected",
        "version": ">=14.2, <14.2.5"
      },
      {
        "status": "affected",
        "version": ">=14.3, <14.3.1"
      }
    ]
  }
]

CVSS3

2.9

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N

AI Score

4.5

Confidence

High

EPSS

0.001

Percentile

32.1%