First published: Mon Apr 11 2022(Updated: )
Improper access control in GitLab CE/EE versions 10.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allows a malicious actor to obtain details of the latest commit in a private project via Merge Requests under certain circumstances
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.7.0<14.7.7 | |
GitLab | >=10.7.0<14.7.7 | |
GitLab | >=14.8.0<14.8.5 | |
GitLab | >=14.8.0<14.8.5 | |
GitLab | >=14.9.0<14.9.2 | |
GitLab | >=14.9.0<14.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1193 is categorized as a high severity vulnerability due to its potential for unauthorized access to project details.
To fix CVE-2022-1193, you should upgrade GitLab CE/EE to versions 14.7.7, 14.8.5, or 14.9.2 or later.
CVE-2022-1193 affects private projects in GitLab where improper access controls allow unauthorized information exposure.
Yes, CVE-2022-1193 can be exploited remotely by a malicious actor under specific conditions.
Vulnerable versions of GitLab include all versions from 10.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2.