First published: Tue May 10 2022(Updated: )
Improper access control in GitLab CE/EE affecting all versions starting from 8.12 before 14.8.6, all versions starting from 14.9 before 14.9.4, and all versions starting from 14.10 before 14.10.1 allows non-project members to access contents of Project Members-only Wikis via malicious CI jobs
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.12.0<14.8.6 | |
GitLab | >=8.12.0<14.8.6 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | =14.10.0 | |
GitLab | =14.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1417 has a medium severity rating due to improper access control vulnerabilities in GitLab.
To fix CVE-2022-1417, upgrade GitLab to version 14.8.6 or later, 14.9.4 or later, or 14.10.1 or later.
CVE-2022-1417 affects all GitLab Community and Enterprise Editions starting from version 8.12 up to specific versions listed in the vulnerability report.
CVE-2022-1417 allows non-project members to access the contents of Project Members-only Wikis through malicious continuous integration jobs.
CVE-2022-1417 was identified as a vulnerability in GitLab and needs to be addressed for the affected versions released before 14.10.1.