ID CVE-2021-39919
Summary In all versions of GitLab CE/EE starting version 14.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, the reset password token and new user email token are accidentally logged which may lead to information disclosure.
References
Vulnerable Configurations
  • cpe:2.3:a:gitlab:gitlab:14.0.0:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.0:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.1:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.1:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.2:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.2:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.3:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.3:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.4:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.4:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.5:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.5:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.6:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.6:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.7:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.7:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.8:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.8:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.9:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.9:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.0:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.0:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.1:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.1:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.2:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.2:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.3:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.3:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.4:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.4:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.5:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.5:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.6:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.6:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.7:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.7:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.0:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.0:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.1:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.1:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.2:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.2:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.3:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.3:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.4:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.4:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.5:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.5:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.6:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.6:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.3.0:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.3.0:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.3.1:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.3.1:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.3.2:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.3.2:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.3.3:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.3.3:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.3.4:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.3.4:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.1:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.1:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.2:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.2:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.3:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.3:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.4:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.4:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.5:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.5:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.6:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.6:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.7:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.7:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.8:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.8:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.0.9:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.0.9:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.1:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.1:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.2:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.2:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.3:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.3:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.4:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.4:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.5:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.5:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.6:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.6:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.1.7:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.1.7:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.1:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.1:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.2:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.2:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.3:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.3:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.4:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.4:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.5:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.5:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.2.6:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.2.6:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.3.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.3.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.3.1:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.3.1:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.3.2:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.3.2:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.3.3:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.3.3:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.3.4:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.3.4:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.4.0:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.4.0:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.4.1:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.4.1:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.4.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.4.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:14.4.1:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:14.4.1:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
    cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
  • cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
    cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
CVSS
Base: 2.1 (as of 16-12-2021 - 03:04)
Impact:
Exploitability:
CWE CWE-640
CAPEC
  • Password Recovery Exploitation
    An attacker may take advantage of the application feature to help users recover their forgotten passwords in order to gain access into the system with the same privileges as the original user. Generally password recovery schemes tend to be weak and insecure. Most of them use only one security question . For instance, mother's maiden name tends to be a fairly popular one. Unfortunately in many cases this information is not very hard to find, especially if the attacker knows the legitimate user. These generic security questions are also re-used across many applications, thus making them even more insecure. An attacker could for instance overhear a coworker talking to a bank representative at the work place and supplying their mother's maiden name for verification purposes. An attacker can then try to log in into one of the victim's accounts, click on "forgot password" and there is a good chance that the security question there will be to provide mother's maiden name. A weak password recovery scheme totally undermines the effectiveness of a strong password scheme.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
Last major update 16-12-2021 - 03:04
Published 13-12-2021 - 16:15
Last modified 16-12-2021 - 03:04
Back to Top