First published: Mon Oct 17 2022(Updated: )
A vulnerability in GitLab CE/EE affecting all versions from 11.10 prior to 15.1.6, 15.2 to 15.2.4, 15.3 to 15.3.2 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.10<15.1.6 | |
GitLab | >=11.10<15.1.6 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.3<15.3.2 | |
GitLab | >=15.3<15.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2992 has a high severity rating as it allows authenticated users to achieve remote code execution.
To fix CVE-2022-2992, upgrade to GitLab versions 15.1.6, 15.2.4, or 15.3.2 or later.
CVE-2022-2992 affects all GitLab CE/EE versions from 11.10 prior to 15.1.6, 15.2 to 15.2.4, and 15.3 to 15.3.2.
Yes, CVE-2022-2992 can be exploited remotely by authenticated users leveraging the Import from GitHub API endpoint.
Both GitLab Community Edition (CE) and Enterprise Edition (EE) installations are impacted by CVE-2022-2992.