First published: Mon Apr 04 2022(Updated: )
Improper authorization in GitLab Pages included with GitLab CE/EE affecting all versions from 11.5 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowed an attacker to steal a user's access token on an attacker-controlled private GitLab Pages website and reuse that token on the victim's other private websites
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.5.0<14.7.7 | |
GitLab | >=11.5.0<14.7.7 | |
GitLab | >=14.8.0<14.8.5 | |
GitLab | >=14.8.0<14.8.5 | |
GitLab | >=14.9.0<14.9.2 | |
GitLab | >=14.9.0<14.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1148 is classified as a high severity vulnerability due to its potential for unauthorized access and token theft.
CVE-2022-1148 allows attackers to steal a user's access token from an attacker-controlled private GitLab Pages site.
To address CVE-2022-1148, GitLab users should upgrade to version 14.7.7, 14.8.5, or 14.9.2 or later.
CVE-2022-1148 affects all versions of GitLab CE/EE from 11.5 to prior versions of 14.7.7, 14.8.5, and 14.9.2.
The potential impact of CVE-2022-1148 includes unauthorized access to sensitive user data and the ability to manipulate projects on GitLab.