First published: Tue Jan 18 2022(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 12.0 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, all versions starting from 14.6.0 before 14.6.2. GitLab was not verifying that a maintainer of a project had the right access to import members from a target project.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.0<14.4.5 | |
GitLab | >=12.0<14.4.5 | |
GitLab | >=14.5.0<14.5.3 | |
GitLab | >=14.5.0<14.5.3 | |
GitLab | >=14.6.0<14.6.2 | |
GitLab | >=14.6.0<14.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0125 is classified as a medium severity vulnerability.
To fix CVE-2022-0125, update your GitLab installation to version 14.4.5 or later, or to version 14.5.3 or later, or to version 14.6.2 or later.
CVE-2022-0125 affects GitLab versions between 12.0 and 14.4.5, 14.5.0 and 14.5.3, and 14.6.0 and 14.6.2.
CVE-2022-0125 is a permissions vulnerability that allows unauthorized members to be imported into a project.
Currently, there is no documented workaround for CVE-2022-0125; the recommended action is to update to a secure version.