First published: Tue Jan 18 2022(Updated: )
An issue has been discovered affecting GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1. GitLab is configured in a way that it doesn't ignore replacement references with git sub-commands, allowing a malicious user to spoof the contents of their commits in the UI.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <14.4.5 | |
GitLab | <14.4.5 | |
GitLab | >=14.5.0<14.5.3 | |
GitLab | >=14.5.0<14.5.3 | |
GitLab | >=14.6.0<14.6.1 | |
GitLab | >=14.6.0<14.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0090 is considered a medium severity vulnerability.
To fix CVE-2022-0090, you should upgrade GitLab to version 14.4.5 or later.
CVE-2022-0090 affects GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1.
CVE-2022-0090 allows a malicious user to spoof the contents of their commits in GitLab.
Yes, both GitLab Community Edition and Enterprise Edition are affected by CVE-2022-0090.