First published: Fri Jan 27 2023(Updated: )
An info leak issue was identified in all versions of GitLab EE from 13.7 prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1 which exposes user email id through webhook payload.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.7.0<15.4.6 | |
GitLab | >=13.7.0<15.4.6 | |
GitLab | >=15.5.0<15.5.5 | |
GitLab | >=15.5.0<15.5.5 | |
GitLab | =15.6.0 | |
GitLab | =15.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4255 has been classified as a medium severity vulnerability due to the potential exposure of user email addresses.
To fix CVE-2022-4255, upgrade GitLab to version 15.4.6, 15.5.5, or 15.6.1 or later.
CVE-2022-4255 affects all versions of GitLab EE from 13.7 prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1.
CVE-2022-4255 exposes user email addresses through webhook payloads.
CVE-2022-4255 affects both the community and enterprise editions of GitLab.