First published: Wed May 11 2022(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 9.2 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not performing correct authorizations on scheduled pipelines allowing a malicious user to run a pipeline in the context of another user.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=9.2.0<14.8.6 | |
GitLab | >=9.2.0<14.8.6 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | =14.10.0 | |
GitLab | =14.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1460 is classified as a high severity vulnerability due to its potential to allow unauthorized execution of scheduled pipelines.
To fix CVE-2022-1460, upgrade your GitLab instance to version 14.8.6, 14.9.4, or 14.10.1 or later.
CVE-2022-1460 affects GitLab versions from 9.2 to 14.8.6, 14.9 from 14.9.0 to 14.9.4, and 14.10.0.
A malicious user can exploit CVE-2022-1460 to run scheduled pipelines without proper authorization.
There is no official workaround for CVE-2022-1460; the recommended action is to apply the available updates.