First published: Fri Jul 01 2022(Updated: )
An improper authorization issue in GitLab CE/EE affecting all versions from 13.7 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to extract the value of an unprotected variable they know the name of in public projects or private projects they're a member of.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.7.0<14.10.5 | |
GitLab | >=13.7.0<14.10.5 | |
GitLab | >=15.0.0<15.0.4 | |
GitLab | >=15.0.0<15.0.4 | |
GitLab | =15.1.0 | |
GitLab | =15.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2229 is considered a high severity vulnerability due to its potential for unauthorized data extraction.
To fix CVE-2022-2229, update GitLab to version 14.10.5 or later, and ensure version 15.0.4 or later is installed.
CVE-2022-2229 affects both public projects and private projects where the attacker is a member.
The impact of CVE-2022-2229 allows attackers to extract protected variable values, compromising sensitive data.
All users of GitLab CE and EE versions from 13.7 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 are affected.