First published: Mon Mar 28 2022(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Under certain conditions, GitLab REST API may allow unprivileged users to add other users to groups even if that is not possible to do through the Web UI.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.2<14.6.5 | |
GitLab | >=13.2<14.6.5 | |
GitLab | >=14.7<14.7.4 | |
GitLab | >=14.7<14.7.4 | |
GitLab | >=14.8<14.8.2 | |
GitLab | >=14.8<14.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0549 is classified as a medium severity vulnerability due to its potential impact on user access control.
To mitigate CVE-2022-0549, upgrade GitLab to version 14.3.6, 14.4.4 or later, or 14.5.2 or later.
CVE-2022-0549 affects all versions of GitLab CE/EE prior to 14.3.6 and specific versions between 14.4 and 14.5.
CVE-2022-0549 could allow unprivileged users to add other users to groups, potentially leading to unauthorized access.
There are no official workarounds for CVE-2022-0549; upgrading to a patched version is the recommended solution.