First published: Mon Oct 17 2022(Updated: )
Lack of IP address checking in GitLab EE affecting all versions from 14.2 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows a group member to bypass IP restrictions when using a deploy token
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.2<15.2.5 | |
GitLab | >=15.3<15.3.4 | |
GitLab | >=15.4<15.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3286 is categorized as a high-severity vulnerability due to its potential to bypass IP address restrictions in GitLab EE.
To fix CVE-2022-3286, upgrade GitLab EE to version 15.2.5, 15.3.4, or 15.4.1 or later.
CVE-2022-3286 affects GitLab EE versions from 14.2 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1.
The impact of CVE-2022-3286 allows unauthorized group members to bypass established IP address restrictions using a deploy token.
CVE-2022-3286 does not directly affect user authentication but allows bypassing IP restrictions, potentially compromising security.