First published: Mon Oct 17 2022(Updated: )
An issue in Incident Timelines has been discovered in GitLab CE/EE affecting all versions starting from 14.9 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2.which allowed an authenticated attacker to inject arbitrary content. A victim interacting with this content could lead to arbitrary requests.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.9.0<15.1.6 | |
GitLab | >=14.9.0<15.1.6 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.3<15.3.2 | |
GitLab | >=15.3<15.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2527 is classified as a medium severity vulnerability.
To fix CVE-2022-2527, upgrade GitLab to version 15.1.6 or newer, 15.2.4 or newer, or 15.3.2 or newer as applicable.
CVE-2022-2527 affects all GitLab CE and EE versions from 14.9 to 15.1.6, 15.2 to 15.2.4, and 15.3 to 15.3.2.
CVE-2022-2527 allows an authenticated attacker to inject arbitrary content into Incident Timelines.
There are no specific workarounds for CVE-2022-2527; upgrading to a patched version is recommended.