Learn about CVE-2021-39892 affecting GitLab versions, allowing unauthorized users to import and expose user email addresses. Find mitigation strategies here.
In this article, you will learn about a vulnerability in GitLab versions that could allow a lower privileged user to import users from projects and disclose email addresses.
Understanding CVE-2021-39892
This section provides insights into the impact, technical details, and mitigation strategies related to CVE-2021-39892.
What is CVE-2021-39892?
CVE-2021-39892 affects GitLab versions, allowing lower privileged users to import users from projects without maintaining roles and expose their email addresses.
The Impact of CVE-2021-39892
The CVSSv3.1 base score for this vulnerability is 4.3 (Medium severity) with low confidentiality impact and no integrity impact. Attack complexity is low, and user interaction is not required.
Technical Details of CVE-2021-39892
Explore the vulnerability description, affected systems, and exploitation mechanism below.
Vulnerability Description
GitLab CE/EE versions since 12.0 are impacted, enabling lower privileged users to reveal email addresses by importing users from projects they lack maintainer roles on.
Affected Systems and Versions
=12.0, <14.1.7
=14.2, <14.2.5
=14.3, <14.3.1
Exploitation Mechanism
The vulnerability allows unauthorized users to extract email addresses by importing users from certain projects without correct permissions.
Mitigation and Prevention
Protect your systems with these immediate and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates