CVE-2022-3740
Published on: Not Yet Published
Last Modified on: 02/01/2023 05:20:00 PM UTC
Certain versions of Gitlab from Gitlab contain the following vulnerability:
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.9 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. A group owner may be able to bypass External Authorization check, if it is enabled, to access git repositories and package registries by using Deploy tokens or Deploy keys .
- CVE-2022-3740 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
GitLab - GitLab version >=12.9, <15.4.6
- Affected Vendor/Software:
GitLab - GitLab version >=15.5, <15.5.5
- Affected Vendor/Software:
GitLab - GitLab version >=15.6, <15.6.1
CVSS3 Score: 4.9 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | HIGH | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Not Found | gitlab.com text/html Inactive LinkNot Archived |
![]() |
HackerOne | hackerone.com text/html |
![]() |
2022/CVE-2022-3740.json · master · GitLab.org / cves · GitLab | gitlab.com text/html |
![]() |
Related QID Numbers
- 690999 Free Berkeley Software Distribution (FreeBSD) Security Update for gitlab (3cde510a-7135-11ed-a28b-bff032704f00)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Gitlab | Gitlab | All | All | All | All |
Application | Gitlab | Gitlab | All | All | All | All |
Application | Gitlab | Gitlab | 15.6.0 | All | All | All |
Application | Gitlab | Gitlab | 15.6.0 | All | All | All |
- cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*:
- cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*:
- cpe:2.3:a:gitlab:gitlab:15.6.0:*:*:*:community:*:*:*:
- cpe:2.3:a:gitlab:gitlab:15.6.0:*:*:*:enterprise:*:*:*:
Discovery Credit
Thanks [@joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program
Social Mentions
Source | Title | Posted (UTC) |
---|