First published: Wed May 11 2022(Updated: )
Due to an insecure direct object reference vulnerability in Gitlab EE/CE affecting all versions from 11.0 prior to 14.8.6, 14.9 prior to 14.9.4, and 14.10 prior to 14.10.1, an endpoint may reveal the issue title to a user who crafted an API call with the ID of the issue from a public project that restricts access to issue only to project members.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.0.0<14.8.6 | |
GitLab | >=11.0.0<14.8.6 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | =14.10.0 | |
GitLab | =14.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1352 is classified as a medium severity vulnerability.
To fix CVE-2022-1352, update GitLab to version 14.8.6, 14.9.4, or 14.10.1 or later.
CVE-2022-1352 affects GitLab EE/CE versions from 11.0 up to 14.8.6, 14.9 up to 14.9.4, and 14.10 up to 14.10.0.
CVE-2022-1352 is an insecure direct object reference vulnerability.
An attacker can potentially reveal the issue title by crafting an API call using the issue ID from a public project.