First published: Mon Oct 17 2022(Updated: )
A crafted tag in the Jupyter Notebook viewer in GitLab EE/CE affecting all versions before 15.1.6, 15.2 to 15.2.4, and 15.3 to 15.3.2 allows an attacker to issue arbitrary HTTP requests
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <15.1.6 | |
GitLab | <15.1.6 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.3<15.3.2 | |
GitLab | >=15.3<15.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2428 has a severity rating of medium due to the potential for attackers to issue arbitrary HTTP requests.
To fix CVE-2022-2428, upgrade your GitLab instance to version 15.1.6 or later, or to version 15.2.5 or later.
CVE-2022-2428 affects all GitLab versions before 15.1.6, as well as versions between 15.2 to 15.2.4 and 15.3 to 15.3.2.
Yes, CVE-2022-2428 is present in both the Community and Enterprise Editions of GitLab before the specified fixed versions.
CVE-2022-2428 can facilitate attacks where an attacker sends crafted requests through the Jupyter Notebook viewer.