GitHub Community Edition/Enterprise Edition 13.0 Bitbucket Server Import access control
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.9 | $0-$5k | 0.00 |
A vulnerability was found in GitHub Community Edition and Enterprise Edition 13.0 (Bug Tracking Software) and classified as critical. Affected by this issue is some unknown processing of the component Bitbucket Server Import. The manipulation with an unknown input leads to a privilege escalation vulnerability. Using CWE to declare the problem leads to CWE-284. Impacted is confidentiality, integrity, and availability. CVE summarizes:
In all versions of GitLab CE/EE since version 13.0, an instance that has the setting to disable Bitbucket Server import enabled is bypassed by an attacker making a crafted API call.
The weakness was disclosed 10/05/2021 as 34078. The advisory is shared for download at gitlab.com. This vulnerability is handled as CVE-2021-39871 since 08/23/2021. The exploitation is known to be easy. Access to the local network is required for this attack to succeed. Required for exploitation is a simple authentication. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 10/09/2021). The MITRE ATT&CK project declares the attack technique as T1068.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Product
Type
Vendor
Name
CPE 2.3
CPE 2.2
CVSSv3
VulDB Meta Base Score: 4.9VulDB Meta Temp Score: 4.9
VulDB Base Score: 5.5
VulDB Temp Score: 5.5
VulDB Vector: 🔒
VulDB Reliability: 🔍
CNA Base Score: 4.3
CNA Vector (GitLab Inc.): 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: Privilege escalationCWE: CWE-284
ATT&CK: T1068
Local: No
Remote: Partially
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔒
Timeline
08/23/2021 CVE reserved10/05/2021 Advisory disclosed
10/05/2021 VulDB entry created
10/09/2021 VulDB last update
Sources
Advisory: 34078Status: Not defined
Confirmation: 🔒
CVE: CVE-2021-39871 (🔒)
Entry
Created: 10/05/2021 09:44 AMUpdated: 10/09/2021 06:54 AM
Changes: (12) vulnerability_cvss3_meta_basescore vulnerability_cvss3_meta_tempscore source_cve_cna vulnerability_cvss3_cna_basescore vulnerability_cvss3_cna_av vulnerability_cvss3_cna_ac vulnerability_cvss3_cna_pr vulnerability_cvss3_cna_ui vulnerability_cvss3_cna_s vulnerability_cvss3_cna_c vulnerability_cvss3_cna_i vulnerability_cvss3_cna_a
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.