Threat Advisory

GitLab Critical Security Release

August 26, 2022 | By Accorian

Recently Gitlab issued a patch for a critical remote code execution vulnerability which impacts GitLab Community Edition (CE) and Enterprise Edition (EE). The vulnerability was tracked as CVE-2022-2884 and a CVSS score of 9.9 was assigned. The issue allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint.

According to Gitlab, the vulnerability affects all GitLab CE/EE versions:

  1. Starting from 11.3.4 before 15.1.5
  2. Starting from 15.2 before 15.2.3
  3. Starting from 15.3 before 15.3.1

Gitlab has requested all users to upgrade to the latest version as soon as possible. GitLab Community Edition and Enterprise Edition versions 15.3.1, 15.2.3, and 15.1.5 comes with the patch for this vulnerability. For users which are not able to upgrade immediately, it has been suggested to disable the GitHub import function from the ‘Visibility and access controls’ menu in the settings. Gitlab makes no announcement about the vulnerability being exploited in the public yet.

Accorian assures to assist all its clients. Please feel free to reach out to us if you have any questions.

Source: https://about.gitlab.com/releases/2022/08/22/critical-security-release-gitlab-15-3-1-released/#Remote%20Command%20Execution%20via%20Github%20import

Threat Advisory Team 

Accorian

Recent Post

Ready to Start?

Ready to Start?


Drop your CVs to joinourteam@accorian.com

Interested Position

Download Case study

Download SOC2 Guide