First published: Mon Oct 17 2022(Updated: )
A vulnerability in GitLab CE/EE affecting all versions from 11.3.4 prior to 15.1.5, 15.2 to 15.2.3, 15.3 to 15.3 to 15.3.1 allows an an authenticated user to achieve remote code execution via the Import from GitHub API endpoint
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.3.4<15.1.5 | |
GitLab | >=11.3.4<15.1.5 | |
GitLab | >=15.2<15.2.3 | |
GitLab | >=15.2<15.2.3 | |
GitLab | >=15.3<15.3.1 | |
GitLab | >=15.3<15.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2884 is considered a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2022-2884, upgrade GitLab to version 15.1.5 or later, or apply any available patches.
CVE-2022-2884 affects all versions of GitLab from 11.3.4 prior to 15.1.5, as well as 15.2 to 15.2.3 and 15.3 to 15.3.1.
CVE-2022-2884 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint.
Yes, CVE-2022-2884 specifically relates to the GitHub integration feature within GitLab.