First published: Tue Jan 24 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.9 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. A group owner may be able to bypass External Authorization check, if it is enabled, to access git repositories and package registries by using Deploy tokens or Deploy keys .
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.9.0<15.4.6 | |
GitLab | >=12.9.0<15.4.6 | |
GitLab | >=15.5.0<15.5.5 | |
GitLab | >=15.5.0<15.5.5 | |
GitLab | =15.6.0 | |
GitLab | =15.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3740 is considered a medium severity vulnerability due to its potential to allow unauthorized access to sensitive resources.
To fix CVE-2022-3740, upgrade GitLab to version 15.3.5, 15.4.4, or 15.5.2 or later.
CVE-2022-3740 affects GitLab CE/EE versions from 12.9 up to 15.4.6, including certain versions of 15.5.
Group owners using affected versions of GitLab with External Authorization enabled may be impacted by CVE-2022-3740.
If upgrading is not possible, consider implementing workarounds for External Authorization checks to mitigate potential risks associated with CVE-2022-3740.