First published: Tue Jan 24 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 12.8 before 15.4.6, all versions starting from 15.5 before 15.5.5, all versions starting from 15.6 before 15.6.1. It was possible to trigger a DoS attack by uploading a malicious nuget package.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.8.0<15.4.6 | |
GitLab | >=12.8.0<15.4.6 | |
GitLab | >=15.5.0<15.5.5 | |
GitLab | >=15.5.0<15.5.5 | |
GitLab | =15.6.0 | |
GitLab | =15.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3478 is classified as a critical severity vulnerability due to its potential to trigger a denial-of-service (DoS) attack.
To mitigate CVE-2022-3478, upgrade GitLab to version 15.4.6 or higher, 15.5.5 or higher, or 15.6.1 or higher.
CVE-2022-3478 affects GitLab versions from 12.8 to below 15.4.6, from 15.5 to below 15.5.5, and from 15.6 to below 15.6.1.
CVE-2022-3478 enables an attacker to conduct a denial-of-service (DoS) attack through the uploading of a malicious nuget package.
Currently, there is no known workaround for CVE-2022-3478, and users are advised to promptly upgrade to the fixed versions.