First published: Thu Jan 12 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A race condition can lead to verified email forgery and takeover of third-party accounts when using GitLab as an OAuth provider.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <15.5.7 | |
GitLab | <15.5.7 | |
GitLab | >=15.6.0<15.6.4 | |
GitLab | >=15.6.0<15.6.4 | |
GitLab | >=15.7.0<15.7.2 | |
GitLab | >=15.7.0<15.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4037 has been classified with a high severity due to its potential for verified email forgery and third-party account takeover.
To fix CVE-2022-4037, update GitLab to version 15.5.7, 15.6.4, or 15.7.2 or later.
CVE-2022-4037 affects all versions of GitLab before 15.5.7 and all versions starting from 15.6 up to 15.6.4 and from 15.7 up to 15.7.2.
CVE-2022-4037 is a race condition vulnerability that can lead to account takeover.
The impact of CVE-2022-4037 includes the possibility of unauthorized access to user accounts through email forgery.