First published: Wed May 11 2022(Updated: )
An improper authorization issue has been discovered in GitLab CE/EE affecting all versions prior to 14.8.6, all versions from 14.9.0 prior to 14.9.4, and 14.10.0, allowing Guest project members to access trace log of jobs when it is enabled
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <14.8.6 | |
GitLab | <14.8.6 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | =14.10.0 | |
GitLab | =14.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1124 is considered a high severity vulnerability due to improper authorization allowing unauthorized access to sensitive data.
To fix CVE-2022-1124, upgrade GitLab to the latest version 14.8.6 or any version from 14.9.4 onwards.
CVE-2022-1124 affects all GitLab CE/EE versions prior to 14.8.6, versions from 14.9.0 to just below 14.9.4, and exactly version 14.10.0.
CVE-2022-1124 exploits an improper authorization issue that allows Guest project members to access trace logs of jobs.
The potential consequences of CVE-2022-1124 include unauthorized exposure of sensitive job trace logs to Guest project members.