First published: Tue Jan 18 2022(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting with 12.3. Under certain conditions it was possible to bypass the IP restriction for public projects through GraphQL allowing unauthorised users to read titles of issues, merge requests and milestones.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=13.2<14.4.5 | |
GitLab GitLab | >=13.2<14.4.5 | |
GitLab GitLab | >=14.5.0<14.5.3 | |
GitLab GitLab | >=14.5.0<14.5.3 | |
GitLab GitLab | >=14.6.0<14.6.2 | |
GitLab GitLab | >=14.6.0<14.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID for this vulnerability is CVE-2022-0172.
The severity of CVE-2022-0172 is medium, with a CVSS score of 6.5.
All versions of GitLab starting with 12.3 and up to version 14.6.2 are affected by CVE-2022-0172.
The vulnerability allows unauthorised users to bypass IP restrictions and access certain project information through GraphQL.
To fix CVE-2022-0172, it is recommended to update to the latest version of GitLab that includes the security patch.