First published: Wed May 11 2022(Updated: )
An issue has been discovered in GitLab affecting all versions before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was incorrectly verifying throttling limits for authenticated package requests which resulted in limits not being enforced.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <14.8.6 | |
GitLab | <14.8.6 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | =14.10.0 | |
GitLab | =14.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1428 is considered a high-severity vulnerability due to the improper verification of throttling limits.
To fix CVE-2022-1428, update GitLab to version 14.8.6 or newer, or to versions 14.9.4 or 14.10.1.
CVE-2022-1428 affects GitLab versions prior to 14.8.6, versions 14.9.0 to 14.9.3, and version 14.10.0.
CVE-2022-1428 can lead to the failure of throttling limits for authenticated package requests, potentially resulting in abuse.
Yes, CVE-2022-1428 can be exploited remotely by authenticated users making package requests.