First published: Mon Oct 17 2022(Updated: )
Improper access control in the GitLab CE/EE API affecting all versions starting from 12.8 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. Allowed for editing the approval rules via the API by an unauthorised user.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.8.0<15.2.5 | |
GitLab | >=12.8.0<15.2.5 | |
GitLab | >=15.3<15.3.4 | |
GitLab | >=15.3<15.3.4 | |
GitLab | >=15.4<15.4.1 | |
GitLab | >=15.4<15.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3325 has a high severity rating due to improper access control in the GitLab API.
To fix CVE-2022-3325, upgrade to GitLab versions 15.2.5, 15.3.4, or 15.4.1 or later.
CVE-2022-3325 affects all GitLab CE/EE versions from 12.8 before 15.2.5, from 15.3 before 15.3.4, and from 15.4 before 15.4.1.
CVE-2022-3325 allows unauthorized users to edit approval rules via the GitLab API.
CVE-2022-3325 is a remote vulnerability that can be exploited through API calls.