In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39899.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/339154 | Broken Link |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitLab
Published: 2021-10-04T16:47:01
Updated: 2021-10-04T16:47:01
Reserved: 2021-08-23T00:00:00
Link: CVE-2021-39899
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-10-04T17:15:08.357
Modified: 2021-10-12T14:25:59.293
Link: CVE-2021-39899
JSON object: View
Redhat Information
No data.
CWE