CVE-2022-4331 — Improper Access Control in Gitlab
Severity
7.3HIGHNVD
EPSS
0.3%
top 44.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 9
Latest updateMar 10
Description
An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:NExploitability: 2.1 | Impact: 5.2
Affected Packages5 packages
🔴Vulnerability Details
1GHSA▶
GHSA-fh7h-m5x3-9v4g: An issue has been discovered in GitLab EE affecting all versions starting from 15↗2023-03-10
📋Vendor Advisories
2GitLab▶
CVE-2022-4331: An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all↗2023-03-09
Debian▶
CVE-2022-4331: gitlab - An issue has been discovered in GitLab EE affecting all versions starting from 1...↗2022