CVE-2022-2497

An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.6 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. A malicious developer could exfiltrate an integration's access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:15.2:*:*:*:enterprise:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:15.2:*:*:*:community:*:*:*

History

21 Nov 2024, 07:01

Type Values Removed Values Added
References () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2497.json - Vendor Advisory () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2497.json - Vendor Advisory
References () https://gitlab.com/gitlab-org/gitlab/-/issues/362671 - Broken Link, Vendor Advisory () https://gitlab.com/gitlab-org/gitlab/-/issues/362671 - Broken Link, Vendor Advisory
References () https://hackerone.com/reports/1557992 - Permissions Required, Third Party Advisory () https://hackerone.com/reports/1557992 - Permissions Required, Third Party Advisory
CVSS v2 : unknown
v3 : 6.4
v2 : unknown
v3 : 8.5

27 Oct 2022, 20:39

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 6.4

09 Sep 2022, 15:15

Type Values Removed Values Added
Summary An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.6 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. A malicious maintainer could exfiltrate an integration's access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server. An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.6 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. A malicious developer could exfiltrate an integration's access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server.

11 Aug 2022, 15:31

Type Values Removed Values Added
References (MISC) https://gitlab.com/gitlab-org/gitlab/-/issues/362671 - (MISC) https://gitlab.com/gitlab-org/gitlab/-/issues/362671 - Broken Link, Vendor Advisory
References (CONFIRM) https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2497.json - (CONFIRM) https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2497.json - Vendor Advisory
References (MISC) https://hackerone.com/reports/1557992 - (MISC) https://hackerone.com/reports/1557992 - Permissions Required, Third Party Advisory
CPE cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:15.2:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:15.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

05 Aug 2022, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-05 16:15

Updated : 2024-11-21 07:01


NVD link : CVE-2022-2497

Mitre link : CVE-2022-2497

CVE.ORG link : CVE-2022-2497


JSON object : View

Products Affected

gitlab

  • gitlab