First published: Wed May 11 2022(Updated: )
Improper input validation in GitLab CE/EE affecting all versions from 8.12 prior to 14.8.6, all versions from 14.9.0 prior to 14.9.4, and 14.10.0 allows a Developer to read protected Group or Project CI/CD variables by importing a malicious project
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.12.0<14.8.6 | |
GitLab | >=8.12.0<14.8.6 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | =14.10.0 | |
GitLab | =14.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1406 has a medium severity rating due to improper input validation allowing unauthorized access to protected CI/CD variables.
To remediate CVE-2022-1406, upgrade to GitLab version 14.8.6 or later, or 14.9.4 and above for affected versions.
CVE-2022-1406 affects all versions of GitLab CE/EE from 8.12 up to 14.8.6, versions from 14.9.0 up to 14.9.4, and version 14.10.0.
CVE-2022-1406 is categorized as an improper input validation vulnerability.
CVE-2022-1406 allows unauthorized developers to read protected Group or Project CI/CD variables by importing a malicious project.