Lucene search

K
cveGitLabCVE-2022-4331
HistoryMar 09, 2023 - 10:15 p.m.

CVE-2022-4331

2023-03-0922:15:51
GitLab
web.nvd.nist.gov
46
gitlab
ee
cve-2022-4331
security vulnerability
saml sso
group transfer
namespace
scim token
nvd

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

50.7%

An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it’s possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group.

Affected configurations

Nvd
Vulners
Node
gitlabgitlabRange15.115.7.8enterprise
OR
gitlabgitlabRange15.815.8.4enterprise
OR
gitlabgitlabRange15.915.9.2enterprise
VendorProductVersionCPE
gitlabgitlab*cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

CNA Affected

[
  {
    "vendor": "GitLab",
    "product": "GitLab",
    "versions": [
      {
        "version": ">=15.1, <15.7.8",
        "status": "affected"
      },
      {
        "version": ">=15.8, <15.8.4",
        "status": "affected"
      },
      {
        "version": ">=15.9, <15.9.2",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

50.7%