First published: Mon Feb 13 2023(Updated: )
A Cross Site Request Forgery issue has been discovered in GitLab CE/EE affecting all versions before 15.6.7, all versions starting from 15.7 before 15.7.6, and all versions starting from 15.8 before 15.8.1. An attacker could take over a project if an Owner or Maintainer uploads a file to a malicious project.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <15.6.7 | |
GitLab | <15.6.7 | |
GitLab | >=15.7<15.7.6 | |
GitLab | >=15.7<15.7.6 | |
GitLab | >=15.8<15.8.1 | |
GitLab | >=15.8<15.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4138 is classified as a high severity vulnerability that allows attackers to take over a project in GitLab.
To fix CVE-2022-4138, update your GitLab installation to version 15.6.7 or later, or to versions 15.7.6 and 15.8.1 or later.
CVE-2022-4138 affects all GitLab versions prior to 15.6.7, as well as versions 15.7 before 15.7.6 and versions 15.8 before 15.8.1.
CVE-2022-4138 is a Cross Site Request Forgery (CSRF) vulnerability.
Yes, CVE-2022-4138 can be exploited remotely by an attacker leveraging the CSRF vulnerability.