First published: Mon Jun 06 2022(Updated: )
Incorrect authorization in GitLab EE affecting all versions from 12.0 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1 allowed an attacker already in possession of a valid Project Deploy Token to misuse it from any location even when IP address restrictions were configured
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.0.0<14.9.5 | |
GitLab | >=14.10.0<14.10.4 | |
GitLab | =15.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1936 is considered a high severity vulnerability due to its potential to allow unauthorized access to sensitive project data.
To mitigate CVE-2022-1936, update GitLab to version 14.9.5 or higher, or to any version within the 14.10.x or 15.0.x series that is not affected.
CVE-2022-1936 affects GitLab EE users on versions from 12.0 before 14.9.5, from 14.10 before 14.10.4, and 15.0 before 15.0.1.
CVE-2022-1936 is classified as an authorization vulnerability that can be exploited to misuse Project Deploy Tokens.
Yes, you can check your GitLab version against the fixed versions mentioned in the CVE description to ensure you are not vulnerable.