First published: Wed May 11 2022(Updated: )
It was possible to disclose details of confidential notes created via the API in Gitlab CE/EE affecting all versions from 13.2 prior to 14.8.6, 14.9 prior to 14.9.4, and 14.10 prior to 14.10.1 if an unauthorised project member was tagged in the note.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.2.0<14.8.6 | |
GitLab | >=13.2.0<14.8.6 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | =14.10.0 | |
GitLab | =14.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1545 has been classified with a medium severity due to potential unauthorized access to confidential notes.
To fix CVE-2022-1545, upgrade your GitLab CE/EE installation to version 14.8.6 or later, or 14.9.4 or later.
CVE-2022-1545 affects GitLab versions from 13.2 to before 14.8.6, 14.9 to before 14.9.4, and 14.10 to before 14.10.1.
CVE-2022-1545 is a vulnerability that allows the disclosure of confidential notes created via the GitLab API by unauthorized users.
Users with unauthorized project access in GitLab can be impacted by CVE-2022-1545 due to its potential for information leakage.