{"id":"CVE-2021-22171","details":"Insufficient validation of authentication parameters in GitLab Pages for GitLab 11.5+ allows an attacker to steal a victim's API token if they click on a maliciously crafted link","aliases":["BIT-gitlab-2021-22171"],"modified":"2026-04-10T04:29:58.657809Z","published":"2021-01-15T16:15:13.517Z","references":[{"type":"ADVISORY","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22171.json"},{"type":"REPORT","url":"https://hackerone.com/reports/718460"},{"type":"REPORT","url":"https://gitlab.com/gitlab-org/gitlab-pages/-/issues/262"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"cb71fca38c3de0c212685f97a46ee8426f63d301"},{"fixed":"06fb068aba3228f300966c8b178bc8ab6d7d1149"},{"introduced":"cb71fca38c3de0c212685f97a46ee8426f63d301"},{"fixed":"06fb068aba3228f300966c8b178bc8ab6d7d1149"},{"introduced":"c050e8fb184690b8c4cc4c2a5c233f312d713b09"},{"fixed":"5f4e8035ffe3e92941384242aabb64f911b94260"},{"introduced":"c050e8fb184690b8c4cc4c2a5c233f312d713b09"},{"fixed":"5f4e8035ffe3e92941384242aabb64f911b94260"},{"introduced":"036576a25d67513637c1e2cba5859af47695188e"},{"fixed":"55a11a0db46cffdc680fec0dce14d2b973833506"},{"introduced":"036576a25d67513637c1e2cba5859af47695188e"},{"fixed":"55a11a0db46cffdc680fec0dce14d2b973833506"}],"database_specific":{"versions":[{"introduced":"11.5.0"},{"fixed":"13.5.6"},{"introduced":"11.5.0"},{"fixed":"13.5.6"},{"introduced":"13.6.0"},{"fixed":"13.6.4"},{"introduced":"13.6.0"},{"fixed":"13.6.4"},{"introduced":"13.7.0"},{"fixed":"13.7.2"},{"introduced":"13.7.0"},{"fixed":"13.7.2"}]}}],"versions":["v13.6.0-ee","v13.6.1-ee","v13.6.3-ee","v13.7.0-ee","v13.7.1-ee"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-22171.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}