First published: Thu Jan 12 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.0 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. GitLab allows unauthenticated users to download user avatars using the victim's user ID, on private instances that restrict public level visibility.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.0.0<15.5.7 | |
GitLab | >=10.0.0<15.5.7 | |
GitLab | >=15.6.0<15.6.4 | |
GitLab | >=15.6.0<15.6.4 | |
GitLab | >=15.7.0<15.7.2 | |
GitLab | >=15.7.0<15.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3870 is considered a medium severity vulnerability due to its potential for data exposure.
To mitigate CVE-2022-3870, upgrade GitLab to a version greater than or equal to 15.5.7, 15.6.4, or 15.7.2 based on your current version.
CVE-2022-3870 affects all versions of GitLab CE/EE starting from 10.0 to under 15.5.7, 15.6 to under 15.6.4, and 15.7 to under 15.7.2.
CVE-2022-3870 is an information disclosure vulnerability that allows unauthorized access to user avatars.
Yes, unauthenticated users can exploit CVE-2022-3870 to download user avatars using the victim's user ID.