Learn about CVE-2021-39895, a GitLab vulnerability that allows attackers to activate pipeline schedules, leading to potential information disclosure. Find out the impact, affected versions, and mitigation steps.
CVE-2021-39895 is a vulnerability in GitLab that allows an attacker to set pipeline schedules to be active in a project export, potentially leading to information disclosure if imported from an untrusted source.
Understanding CVE-2021-39895
CVE-2021-39895 affects versions of GitLab from 8.0 to 14.3.1.
What is CVE-2021-39895?
In all versions of GitLab CE/EE since version 8.0, an attacker can set the pipeline schedules to be active in a project export so when an unsuspecting owner imports that project, pipelines are active by default on that project. This could lead to information disclosure in certain scenarios.
The Impact of CVE-2021-39895
The CVSS score for this vulnerability is 6/10 (Medium severity), with high confidentiality and integrity impact. The attack complexity is high, and user interaction is required.
Technical Details of CVE-2021-39895
CVE-2021-39895 has the following technical details:
Vulnerability Description
The vulnerability allows an attacker to activate pipeline schedules in a project export, potentially causing information disclosure upon import.
Affected Systems and Versions
=8.0, <14.1.7
=14.2, <14.2.5
=14.3, <14.3.1
Exploitation Mechanism
The attacker can exploit this vulnerability by manipulating pipeline schedules during project exports.
Mitigation and Prevention
It is essential to take immediate action to mitigate the risks posed by CVE-2021-39895.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates