First published: Mon Apr 04 2022(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.2 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 that allowed for an unauthorised user to read the the approval rules of a private project.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.2.0<14.7.7 | |
GitLab | >=12.2.0<14.7.7 | |
GitLab | >=14.8.0<14.8.5 | |
GitLab | >=14.8.0<14.8.5 | |
GitLab | >=14.9.0<14.9.2 | |
GitLab | >=14.9.0<14.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1189 has been classified as a medium severity vulnerability.
To fix CVE-2022-1189, upgrade your GitLab installation to version 14.7.7 or later, or 14.8.5 or later, or 14.9.2 or later.
CVE-2022-1189 affects all GitLab CE/EE versions from 12.2 up to 14.7.7, from 14.8 up to 14.8.5, and from 14.9 up to 14.9.2.
CVE-2022-1189 is an issue that allows unauthorized users to read the approval rules of private projects in GitLab.
Yes, CVE-2022-1189 affects both GitLab Community Edition and GitLab Enterprise Edition.