First published: Fri Jul 01 2022(Updated: )
Information exposure in GitLab EE affecting all versions from 12.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker with the appropriate access tokens to obtain CI variables in a group with using IP-based access restrictions even if the GitLab Runner is calling from outside the allowed IP range
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.0.0<14.10.5 | |
GitLab | >=15.0.0<15.0.4 | |
GitLab | =15.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2228 is classified as a high-severity vulnerability due to information exposure risks.
To remediate CVE-2022-2228, upgrade GitLab EE to version 14.10.5, 15.0.4, or 15.1.1 or later.
CVE-2022-2228 affects all versions of GitLab EE from 12.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1.
CVE-2022-2228 allows an attacker to obtain CI variables from a group using IP-based access restrictions.
An attacker with the appropriate access tokens can exploit CVE-2022-2228.