Vulnerability Description
An improper authorization issue in GitLab CE/EE affecting all versions from 13.7 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to extract the value of an unprotected variable they know the name of in public projects or private projects they're a member of.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 13.7.0, < 14.10.5 |
References
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2229.jsonVendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/355738Broken Link
- https://hackerone.com/reports/1511133Permissions RequiredThird Party Advisory
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2229.jsonVendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/355738Broken Link
- https://hackerone.com/reports/1511133Permissions RequiredThird Party Advisory
FAQ
What is CVE-2022-2229?
CVE-2022-2229 is a vulnerability with a CVSS score of 7.5 (HIGH). An improper authorization issue in GitLab CE/EE affecting all versions from 13.7 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to extract the value of an unprotec...
How severe is CVE-2022-2229?
CVE-2022-2229 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2229?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.