First published: Wed Nov 09 2022(Updated: )
An open redirect vulnerability in GitLab EE/CE affecting all versions from 9.3 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2, allows an attacker to redirect users to an arbitrary location if they trust the URL.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=9.4.0<15.3.5 | |
GitLab | >=9.4.0<15.3.5 | |
GitLab | >=15.4.0<15.4.4 | |
GitLab | >=15.4.0<15.4.4 | |
GitLab | >=15.5.0<15.5.2 | |
GitLab | >=15.5.0<15.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-3486 is considered high due to the potential for exploitation via open redirects.
To fix CVE-2022-3486, update your GitLab instance to version 15.3.5, 15.4.4, or 15.5.2 or later.
CVE-2022-3486 affects all GitLab EE/CE versions from 9.3 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2.
The potential impacts of CVE-2022-3486 include enabling attackers to redirect users to malicious sites through trusted URLs.
Yes, CVE-2022-3486 can be exploited without user authentication, making it particularly concerning.