First published: Mon Oct 17 2022(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. It may be possible for an attacker to guess a user's password by brute force by sending crafted requests to a specific endpoint, even if the victim user has 2FA enabled on their account.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <15.1.6 | |
GitLab | <15.1.6 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.3<15.3.2 | |
GitLab | >=15.3<15.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3031 has been classified as a high severity vulnerability due to its potential to expose user passwords through brute force attacks.
CVE-2022-3031 affects all GitLab CE/EE versions prior to 15.1.6, versions from 15.2 to before 15.2.4, and versions from 15.3 to before 15.3.2.
To remediate CVE-2022-3031, it is essential to upgrade GitLab to version 15.1.6 or higher, 15.2.4 or higher, or 15.3.2 or higher.
Yes, an attacker can exploit CVE-2022-3031 remotely by sending crafted requests to the affected GitLab endpoints to attempt password guessing.
While immediate patching is recommended, reducing the frequency of user password attempts and implementing strong password policies can serve as a temporary mitigation for CVE-2022-3031.