Lucene search

K
cvelistGitLabCVELIST:CVE-2022-3726
HistoryNov 09, 2022 - 12:00 a.m.

CVE-2022-3726

2022-11-0900:00:00
GitLab
www.cve.org
1
gitlab
sand-boxing
openapi
http request manipulation

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N

9 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.8%

Lack of sand-boxing of OpenAPI documents in GitLab CE/EE affecting all versions from 12.6 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to trick a user to click on the Swagger OpenAPI viewer and issue HTTP requests that affect the victim’s account.

CNA Affected

[
  {
    "vendor": "GitLab",
    "product": "GitLab",
    "versions": [
      {
        "version": ">=12.6, <15.3.5",
        "status": "affected"
      },
      {
        "version": ">=15.4, <15.4.4",
        "status": "affected"
      },
      {
        "version": ">=15.5, <15.5.2",
        "status": "affected"
      }
    ]
  }
]

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N

9 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.8%