CVE-2022-4331Improper Access Control in Gitlab

Severity
7.3HIGHNVD
EPSS
0.3%
top 44.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 9
Latest updateMar 10

Description

An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:NExploitability: 2.1 | Impact: 5.2

Affected Packages5 packages

NVDgitlab/gitlab15.115.7.8+2
CVEListV5gitlab/gitlab>=15.1, <15.7.8, >=15.8, <15.8.4, >=15.9, <15.9.2+2
debiandebian/gitlab
gitlabgitlab/gitlab

🔴Vulnerability Details

1
GHSA
GHSA-fh7h-m5x3-9v4g: An issue has been discovered in GitLab EE affecting all versions starting from 152023-03-10

📋Vendor Advisories

2
GitLab
CVE-2022-4331: An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all2023-03-09
Debian
CVE-2022-4331: gitlab - An issue has been discovered in GitLab EE affecting all versions starting from 1...2022