A vulnerability in GitLab CE/EE affecting all versions from 11.10 prior to 15.1.6, 15.2 to 15.2.4, 15.3 to 15.3.2 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint.
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2992.json | Third Party Advisory |
https://hackerone.com/reports/1679624 | Permissions Required Third Party Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/371884 | Broken Link Third Party Advisory |
http://packetstormsecurity.com/files/171008/GitLab-GitHub-Repo-Import-Deserialization-Remote-Code-Execution.html |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-10-17 09:15
Updated : 2023-02-15 12:15
NVD link : CVE-2022-2992
Mitre link : CVE-2022-2992
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
gitlab
- gitlab