First published: Fri Apr 01 2022(Updated: )
Improper access control in Gitlab CE/EE versions 12.7 to 14.5.4, 14.6 to 14.6.4, and 14.7 to 14.7.1 allowed for project non-members to retrieve issue details when it was linked to an item from the vulnerability dashboard.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.7.0<=14.5.4 | |
GitLab | >=12.7.0<=14.5.4 | |
GitLab | >=14.6.0<=14.6.4 | |
GitLab | >=14.6.0<=14.6.4 | |
GitLab | =14.7.0 | |
GitLab | =14.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0390 is classified as a high-severity vulnerability due to improper access control allowing unauthorized access to issue details.
To fix CVE-2022-0390, update GitLab to version 14.5.5 or later, 14.6.5 or later, or 14.7.2 or later.
CVE-2022-0390 affects GitLab CE/EE versions from 12.7.0 to 14.5.4, 14.6.0 to 14.6.4, and 14.7.0 to 14.7.1.
CVE-2022-0390 allows project non-members to retrieve sensitive issue details, potentially leading to data exposure.
There is no official workaround for CVE-2022-0390; the recommended action is to update to a patched version of GitLab.