First published: Mon Mar 28 2022(Updated: )
Inaccurate display of Snippet files containing special characters in all versions of GitLab CE/EE allows an attacker to create Snippets with misleading content which could trick unsuspecting users into executing arbitrary commands
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.0<14.6.5 | |
GitLab | >=10.0<14.6.5 | |
GitLab | >=14.7<14.7.4 | |
GitLab | >=14.7<14.7.4 | |
GitLab | >=14.8<14.8.2 | |
GitLab | >=14.8<14.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0751 has been assigned a severity level that indicates it poses a significant risk due to the potential for misleading users into executing arbitrary commands.
To fix CVE-2022-0751, upgrade your GitLab instance to a version that is patched against this vulnerability, specifically any version greater than 14.8.2.
CVE-2022-0751 affects all versions of GitLab CE/EE from 10.0 to 14.8.2, inclusive.
CVE-2022-0751 allows an attacker to create misleading Snippets containing special characters that could trick users into executing unintended commands.
There are no official workarounds for CVE-2022-0751, so it is recommended to upgrade to a fixed version as soon as possible.