CVE-2022-3820Authentication Bypass by Spoofing in Gitlab

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 69.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 26

Description

An issue has been discovered in GitLab affecting all versions starting from 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. GitLab was not performing correct authentication with some Package Registries when IP address restrictions were configured, allowing an attacker already in possession of a valid Deploy Token to misuse it from any location.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

NVDgitlab/gitlab15.4.015.4.6+2
debiandebian/gitlab< gitlab 15.10.8+ds1-2 (sid)
CVEListV5gitlab/gitlab>=15.4, <15.4.6, >=15.5, <15.5.5, >=15.6, <15.6.1+2
gitlabgitlab/gitlab

🔴Vulnerability Details

2
OSV
CVE-2022-3820: An issue has been discovered in GitLab affecting all versions starting from 152023-01-26
GHSA
GHSA-jc5p-hfq2-7mfm: An issue has been discovered in GitLab affecting all versions starting from 152023-01-26

📋Vendor Advisories

2
GitLab
CVE-2022-3820: An issue has been discovered in GitLab affecting all versions starting from 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. GitLab was not performing2023-01-26
Debian
CVE-2022-3820: gitlab - An issue has been discovered in GitLab affecting all versions starting from 15.4...2022