First published: Mon Jun 06 2022(Updated: )
An account takeover issue has been discovered in GitLab EE affecting all versions starting from 11.10 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1. When group SAML SSO is configured, the SCIM feature (available only on Premium+ subscriptions) may allow any owner of a Premium group to invite arbitrary users through their username and email, then change those users' email addresses via SCIM to an attacker controlled email address and thus - in the absence of 2FA - take over those accounts. It is also possible for the attacker to change the display name and username of the targeted account.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.10.0<14.9.5 | |
GitLab | >=14.10.0<14.10.4 | |
GitLab | =15.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1680 has been rated as a high-severity vulnerability due to its potential for account takeover.
To fix CVE-2022-1680, upgrade GitLab EE to versions 14.9.5, 14.10.4, or 15.0.1 or later.
CVE-2022-1680 affects GitLab EE versions from 11.10 to 14.9.4, 14.10 to 14.10.3, and 15.0 before 15.0.1.
CVE-2022-1680 allows for the potential compromise of user accounts via group SAML SSO configurations.
There are no known effective workarounds for CVE-2022-1680, so the best course of action is to apply the recommended updates.