GitLab Community Edition/Enterprise Edition up to 14.8.5/14.9.3 Trace Log improper authorization
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.2 | $0-$5k | 0.00 |
A vulnerability was found in GitLab Community Edition and Enterprise Edition up to 14.8.5/14.9.3 (Bug Tracking Software). It has been classified as critical. This affects some unknown processing of the component Trace Log Handler. The manipulation with an unknown input leads to a improper authorization vulnerability. CWE is classifying the issue as CWE-285. The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. This is going to have an impact on confidentiality.
The weakness was disclosed 05/12/2022 as 32355. It is possible to read the advisory at gitlab.com. This vulnerability is uniquely identified as CVE-2022-1124 since 03/28/2022. The technical details are unknown and an exploit is not publicly available. The attack technique deployed by this issue is T1548.002 according to MITRE ATT&CK.
Upgrading to version 14.8.6, 14.9.4 or 14.10.0 eliminates this vulnerability.
Product
Type
Vendor
Name
License
- open-source
CPE 2.3
CPE 2.2
CVSSv3
VulDB Meta Base Score: 4.3VulDB Meta Temp Score: 4.2
VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔒
VulDB Reliability: 🔍
CNA Base Score: 4.3
CNA Vector (GitLab Inc.): 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: Improper authorizationCWE: CWE-285 / CWE-266
ATT&CK: T1548.002
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔒
Upgrade: Community Edition/Enterprise Edition 14.8.6/14.9.4/14.10.0
Timeline
03/28/2022 CVE reserved05/12/2022 Advisory disclosed
05/12/2022 VulDB entry created
05/13/2022 VulDB last update
Sources
Vendor: gitlab.comAdvisory: 32355
Status: Confirmed
Confirmation: 🔒
CVE: CVE-2022-1124 (🔒)
Entry
Created: 05/12/2022 07:13 AMUpdated: 05/13/2022 07:27 PM
Changes: 05/12/2022 07:13 AM (52), 05/13/2022 07:27 PM (1)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.