CVE-2022-4331

An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 07:35

Type Values Removed Values Added
References () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4331.json - Vendor Advisory () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4331.json - Vendor Advisory
References () https://gitlab.com/gitlab-org/gitlab/-/issues/385050 - Broken Link () https://gitlab.com/gitlab-org/gitlab/-/issues/385050 - Broken Link
References () https://hackerone.com/reports/1791518 - Permissions Required () https://hackerone.com/reports/1791518 - Permissions Required
CVSS v2 : unknown
v3 : 7.3
v2 : unknown
v3 : 5.7

Information

Published : 2023-03-09 22:15

Updated : 2024-11-21 07:35


NVD link : CVE-2022-4331

Mitre link : CVE-2022-4331

CVE.ORG link : CVE-2022-4331


JSON object : View

Products Affected

gitlab

  • gitlab