#VU57047 Insufficient Session Expiration in Gitlab Community Edition and GitLab Enterprise Edition - CVE-2021-39896 

 

#VU57047 Insufficient Session Expiration in Gitlab Community Edition and GitLab Enterprise Edition - CVE-2021-39896

Published: October 5, 2021


Vulnerability identifier: #VU57047
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-39896
CWE-ID: CWE-613
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Gitlab Community Edition
GitLab Enterprise Edition
Software vendor:
GitLab, Inc

Description

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to improper session management in impersonation feature. A remote administrator can use the impersonate feature twice and stops impersonating, the admin may be logged in as the second user they impersonated, which may lead to repudiation issues.


Remediation

Install updates from vendor's website.

External links