First published: Fri Oct 28 2022(Updated: )
An information disclosure vulnerability in GitLab CE/EE affecting all versions starting from 9.3 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1 allows a project maintainer to access the DataDog integration API key from webhook logs.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=9.3.0<15.2.5 | |
GitLab | >=9.3.0<15.2.5 | |
GitLab | >=15.3<15.3.4 | |
GitLab | >=15.3<15.3.4 | |
GitLab | >=15.4<15.4.1 | |
GitLab | >=15.4<15.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3018 has been classified as a medium severity vulnerability.
To fix CVE-2022-3018, upgrade to GitLab version 15.2.5 or later, 15.3.4 or later, or 15.4.1 or later.
CVE-2022-3018 affects all GitLab CE/EE versions from 9.3 to before 15.2.5, from 15.3 to before 15.3.4, and from 15.4 to before 15.4.1.
An attacker with access as a project maintainer can exploit CVE-2022-3018 to access the DataDog integration API key.
CVE-2022-3018 is classified as an information disclosure vulnerability.