Vulnerability

Gitlab vulnerabilities

This live blog contains information regarding Gitlab vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog. Last updated on April 2, 2022.

Clip path group@2x

T-Update

Information about vulnerabilities

This live blog contains information regarding Gitlab vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog. Last updated on April 2, 2022.

Update April 2, 2022

12:00 | On March 31st, Gitlab has released their monthly security update. This security update solves one critical vulnerability, identified as CVE-2022-1162. This vulnerability describes hardcoded passwords set for user accounts registered using an OmniAuth provider.

It is advised to apply this security patch as soon as possible. Additionally, it is advised to reset the password of impacted user accounts. Gitlab has released a script to identify potentially impacted user accounts.

Are my systems vulnerable?

The following versions of Gitlab Community Edition and Enterprise Edition are vulnerable:

  • 14.7 prior to 14.7.7
  • 14.8 prior to 14.8.5
  • 14.9 prior to 14.9.2

What can I do to reduce or stop potential damage?

Gitlab has released security updates mitigating this and several other vulnerabilities. It is strongly advised to upgrade as soon as possible to one of the following versions:

  • 14.7.7
  • 14.8.5
  • 14.9.2

Additionally, it is advised to reset the password for potentially impacted user accounts. Gitlab has released a script to identify those user accounts.

Customized cyber security

Background

The monthly security update fixes multiple vulnerabilities. The most severe one, which is the subject of this advisory, is CVE-2022-1162. This vulnerability describes hardcoded passwords set for user accounts registered using the OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab Community Edition and Enterprise Edition. The CVE has a CVSS score of 9.1. The CVSS scale runs from 0 to 10.

Risk

The use of hardcoded passwords may allow attackers to take over user accounts configured with those hardcoded passwords.

Advice

Ellipse 6

Sign up to receive T-Updates

Receive the latest vulnerabilities in your email every Wednesday

More than 1,000 organisations have already joined us.

Tesorion gebruikt jouw gegevens voor het versturen van de gevraagde informatie. Daarnaast worden je gegevens mogelijk gebruikt voor commerciële opvolging. Je kunt je op elk gewenst moment hiervoor afmelden via de link in de e-mail. Lees voor meer informatie ons privacybeleid.

Ellipse 6