Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-39899

Опубликовано: 04 окт. 2021
Источник: nvd
CVSS3: 2.9
CVSS3: 4.2
CVSS2: 1.9
EPSS Низкий

Описание

In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
Версия от 1.0.0 (включая) до 14.1.7 (исключая)
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
Версия от 1.0.0 (включая) до 14.1.7 (исключая)
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
Версия от 14.2 (включая) до 14.2.5 (исключая)
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
Версия от 14.2 (включая) до 14.2.5 (исключая)
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
Версия от 14.3 (включая) до 14.3.1 (исключая)
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
Версия от 14.3 (включая) до 14.3.1 (исключая)

EPSS

Процентиль: 22%
0.00073
Низкий

2.9 Low

CVSS3

4.2 Medium

CVSS3

1.9 Low

CVSS2

Дефекты

CWE-640

Связанные уязвимости

CVSS3: 2.9
ubuntu
больше 4 лет назад

In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.

CVSS3: 2.9
debian
больше 4 лет назад

In all versions of GitLab CE/EE, an attacker with physical access to a ...

github
больше 3 лет назад

In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.

EPSS

Процентиль: 22%
0.00073
Низкий

2.9 Low

CVSS3

4.2 Medium

CVSS3

1.9 Low

CVSS2

Дефекты

CWE-640