First published: Fri Aug 05 2022(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. It may be possible for group members to bypass 2FA enforcement enabled at the group level by using Resource Owner Password Credentials grant to obtain an access token without using 2FA.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <15.0.5 | |
GitLab | >=15.1.0<15.1.4 | |
GitLab | =15.2 | |
GitLab | <15.0.5 | |
GitLab | >=15.1.0<15.1.4 | |
GitLab | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2303 has a medium severity rating due to its potential to bypass two-factor authentication enforcement.
To fix CVE-2022-2303, upgrade GitLab to version 15.0.5 or any version from 15.1.4 onwards, or from 15.2.1 onward.
CVE-2022-2303 affects all versions of GitLab before 15.0.5 and those from 15.1.0 up to 15.1.4 and from 15.2 up to 15.2.1.
CVE-2022-2303 is a security vulnerability that may allow group members to bypass two-factor authentication enforcement.
Yes, CVE-2022-2303 can potentially be exploited remotely if an attacker gains access to a group member's credentials.