[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2022-1162Date: (C)2022-04-05   (M)2023-12-22


A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 9.8CVSS Score : 7.5
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
http://packetstormsecurity.com/files/166828/Gitlab-14.9-Authentication-Bypass.html
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1162.json
https://gitlab.com/gitlab-org/gitlab/-/issues/357210

CPE    2
cpe:/a:gitlab:gitlab:::~~community~~~
cpe:/a:gitlab:gitlab:::~~enterprise~~~
CWE    1
CWE-798
OVAL    2
oval:org.secpod.oval:def:78572
oval:org.secpod.oval:def:78573

© SecPod Technologies