First published: Wed Nov 09 2022(Updated: )
Improper authorization in GitLab CE/EE affecting all versions from 7.14 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a user retrying a job in a downstream pipeline to take ownership of the retried jobs in the upstream pipeline even if the user doesn't have access to that project.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=7.14.0<15.3.5 | |
GitLab | >=7.14.0<15.3.5 | |
GitLab | >=15.4.0<15.4.4 | |
GitLab | >=15.4.0<15.4.4 | |
GitLab | >=15.5.0<15.5.2 | |
GitLab | >=15.5.0<15.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3706 is classified as a high severity vulnerability due to its potential impact on authorization mechanisms.
To fix CVE-2022-3706, update your GitLab installation to version 15.3.5, 15.4.4, or 15.5.2 or later immediately.
CVE-2022-3706 affects all GitLab CE/EE versions from 7.14 to versions prior to 15.3.5, 15.4.4, and 15.5.2.
CVE-2022-3706 represents an improper authorization flaw that allows unauthorized users to take ownership of jobs in upstream pipelines.
Users with the ability to retry jobs in downstream pipelines may be able to act on jobs in upstream pipelines they do not have permission for.