Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2022-1162 — Hard-coded Credentials in Gitlab
Severity
9.8CRITICALNVD
EPSS
88.9%
top 0.47%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 4
Latest updateFeb 26
Description
A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages5 packages
🔴Vulnerability Details
2💥Exploits & PoCs
2Nuclei▶
GitLab CE/EE - Hard-Coded Credentials
🔍Detection Rules
2📋Vendor Advisories
3GitLab▶
CVE-2022-1162: A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7↗2022-04-04
Debian▶
CVE-2022-1162: gitlab - A hardcoded password was set for accounts registered using an OmniAuth provider ...↗2022