First published: Fri Aug 05 2022(Updated: )
Insufficient validation in GitLab CE/EE affecting all versions from 12.10 prior to 15.0.5, 15.1 prior to 15.1.4, and 15.2 prior to 15.2.1 allows an authenticated and authorised user to import a project that includes branch names which are 40 hexadecimal characters, which could be abused in supply chain attacks where a victim pinned to a specific Git commit of the project.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.10.0<15.0.5 | |
GitLab | >=15.1.0<15.1.4 | |
GitLab | =15.2 | |
GitLab | >=12.10.0<15.0.5 | |
GitLab | >=15.1.0<15.1.4 | |
GitLab | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2417 has been classified as a medium severity vulnerability due to insufficient validation.
To fix CVE-2022-2417, upgrade your GitLab installation to version 15.0.5 or later, 15.1.4 or later, or 15.2.1 or later.
CVE-2022-2417 affects all versions of GitLab CE/EE from 12.10 up to versions prior to 15.0.5, 15.1.4, and 15.2.1.
An authenticated user can exploit CVE-2022-2417 to import a project with malicious branch names, potentially causing supply chain issues.
There are no recommended workarounds for CVE-2022-2417, so updating to a patched version is essential for security.