First published: Wed Nov 09 2022(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.1 before 15.3.5, all versions starting from 15.4 before 15.4.4, all versions starting from 15.5 before 15.5.2. A malicious maintainer could exfiltrate a Datadog integration's access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=12.1.0<15.3.5 | |
GitLab GitLab | >=12.1.0<15.3.5 | |
GitLab GitLab | >=15.4.0<15.4.4 | |
GitLab GitLab | >=15.4.0<15.4.4 | |
GitLab GitLab | >=15.5.0<15.5.2 | |
GitLab GitLab | >=15.5.0<15.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-3483 is medium, with a CVSS score of 5.4.
All versions of GitLab CE/EE starting from 12.1 before 15.3.5, 15.4 before 15.4.4, and 15.5 before 15.5.2 are affected by CVE-2022-3483.
CVE-2022-3483 allows a malicious maintainer to exfiltrate a Datadog integration's access token by modifying the integration.
To fix CVE-2022-3483, it is recommended to upgrade to GitLab CE/EE version 15.3.5, 15.4.4, or 15.5.2 or later.
More information about CVE-2022-3483 can be found in the GitLab CVE JSON file and the related GitLab and HackerOne links.