Improper access control in the GitLab CE/EE API affecting all versions starting from 12.8 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. Allowed for editing the approval rules via the API by an unauthorised user.
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3325.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/360819 | Broken Link Vendor Advisory |
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3325.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/360819 | Broken Link Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 2.7 |
References | () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3325.json - Vendor Advisory | |
References | () https://gitlab.com/gitlab-org/gitlab/-/issues/360819 - Broken Link, Vendor Advisory |
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2022-10-17 16:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3325
Mitre link : CVE-2022-3325
CVE.ORG link : CVE-2022-3325
JSON object : View
Products Affected
gitlab
- gitlab
CWE