First published: Fri Jul 01 2022(Updated: )
Improper access control in the runner jobs API in GitLab CE/EE affecting all versions prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows a previous maintainer of a project with a specific runner to access job and project meta data under certain conditions
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <14.10.5 | |
GitLab | <14.10.5 | |
GitLab | >=15.0.0<15.0.4 | |
GitLab | >=15.0.0<15.0.4 | |
GitLab | =15.1.0 | |
GitLab | =15.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2227 has a medium severity due to improper access control vulnerabilities.
To fix CVE-2022-2227, upgrade GitLab to version 14.10.5, 15.0.4, or 15.1.1 or later.
CVE-2022-2227 affects all versions of GitLab prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1.
Due to CVE-2022-2227, unauthorized users can access job and project metadata.
Update GitLab community and enterprise versions to 14.10.5, 15.0.4, or 15.1.1 to address CVE-2022-2227.