Lucene search

K
cvelistGitLabCVELIST:CVE-2022-2497
HistoryAug 05, 2022 - 3:09 p.m.

CVE-2022-2497

2022-08-0515:09:19
GitLab
www.cve.org

8.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.8%

An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.6 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. A malicious developer could exfiltrate an integration’s access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server.

CNA Affected

[
  {
    "product": "GitLab",
    "vendor": "GitLab",
    "versions": [
      {
        "status": "affected",
        "version": ">=12.6, <15.0.5"
      },
      {
        "status": "affected",
        "version": ">=15.1, <15.1.4"
      },
      {
        "status": "affected",
        "version": ">=15.2, <15.2.1"
      }
    ]
  }
]

8.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.8%