#VU65877 Improper access control in Gitlab Community Edition and GitLab Enterprise Edition - CVE-2022-2497 

 

#VU65877 Improper access control in Gitlab Community Edition and GitLab Enterprise Edition - CVE-2022-2497

Published: July 29, 2022


Vulnerability identifier: #VU65877
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-2497
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Gitlab Community Edition
GitLab Enterprise Edition
Software vendor:
GitLab, Inc

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote administrator can exfiltrate an integration's access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server.


Remediation

Install updates from vendor's website.

External links