CVE-2021-39899

Published Oct 4, 2021

Last updated 3 years ago

Overview

Description
In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.
Source
cve@gitlab.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
4.2
Impact score
3.6
Exploitability score
0.5
Vector string
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
1.9
Impact score
2.9
Exploitability score
3.4
Vector string
AV:L/AC:M/Au:N/C:P/I:N/A:N

Weaknesses

nvd@nist.gov
CWE-640

Social media

Hype score
Not currently trending

Configurations