First published: Tue May 10 2022(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 12.10 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not correctly handling malicious requests to the PyPi API endpoint allowing the attacker to cause uncontrolled resource consumption.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.10.0<14.8.6 | |
GitLab | >=12.10.0<14.8.6 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | =14.10.0 | |
GitLab | =14.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-1431 is classified as critical due to its impact on the security of the GitLab instance.
To fix CVE-2022-1431, you should upgrade your GitLab instance to version 14.8.6 or later, or to 14.9.4 or later if on the 14.9 series.
CVE-2022-1431 affects all GitLab versions from 12.10 to before 14.8.6, from 14.9 to before 14.9.4, and from 14.10 to before 14.10.1.
Yes, CVE-2022-1431 can be exploited remotely by sending malicious requests to the PyPi API endpoint.
If you cannot update immediately due to CVE-2022-1431, consider implementing network segmentation or rate limiting to mitigate potential exploitation.