Description
In all versions of GitLab CE/EE since version 8.0, an attacker can set the pipeline schedules to be active in a project export so when an unsuspecting owner imports that project, pipelines are active by default on that project. Under specialized conditions, this may lead to information disclosure if the project is imported from an untrusted source.
Published: 2021-11-04
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-26251 In all versions of GitLab CE/EE since version 8.0, an attacker can set the pipeline schedules to be active in a project export so when an unsuspecting owner imports that project, pipelines are active by default on that project. Under specialized conditions, this may lead to information disclosure if the project is imported from an untrusted source.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2024-08-04T02:20:33.884Z

Reserved: 2021-08-23T00:00:00.000Z

Link: CVE-2021-39895

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-11-05T00:15:10.280

Modified: 2024-11-21T06:20:29.857

Link: CVE-2021-39895

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses