First published: Thu Mar 09 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 12.8 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. This vulnerability could allow a user to unmask the Discord Webhook URL through viewing the raw API response.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.8.0<15.7.8 | |
GitLab | >=12.8.0<15.7.8 | |
GitLab | >=15.8.0<15.8.4 | |
GitLab | >=15.8.0<15.8.4 | |
GitLab | >=15.9.0<15.9.2 | |
GitLab | >=15.9.0<15.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4462 is classified as a medium severity vulnerability.
To fix CVE-2022-4462, you should upgrade GitLab to version 15.7.8 or later, or upgrade to version 15.8.4 or later, or 15.9.2 or later.
CVE-2022-4462 affects all GitLab versions starting from 12.8 before 15.7.8, 15.8 before 15.8.4, and 15.9 before 15.9.2.
Attackers can exploit CVE-2022-4462 to unmask the Discord Webhook URL by viewing the raw API response.
No, CVE-2022-4462 affects both the Community and Enterprise editions of GitLab.