An improper access control check in GitLab CE/EE affecting all versions starting from 13.7 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1 allows a malicious authenticated user to view a public project's Deploy Key's public fingerprint and name when that key has write permission. Note that GitLab never asks for nor stores the private key.
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2095.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/365415 | Broken Link Vendor Advisory |
https://hackerone.com/reports/1600325 | Permissions Required Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2022-08-05 09:15
Updated : 2022-08-11 08:01
NVD link : CVE-2022-2095
Mitre link : CVE-2022-2095
JSON object : View
CWE
CWE-863
Incorrect Authorization
Products Affected
gitlab
- gitlab