OS Command Injection Affecting gitlab package, versions <15.10.8+ds1-2
Threat Intelligence
Exploit Maturity
Mature
EPSS
0.86% (83rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-GITLAB-2988808
- published 23 Aug 2022
- disclosed 17 Oct 2022
Introduced: 23 Aug 2022
CVE-2022-2884 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
gitlab
to version 15.10.8+ds1-2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gitlab
package and not the gitlab
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
A vulnerability in GitLab CE/EE affecting all versions from 11.3.4 prior to 15.1.5, 15.2 to 15.2.3, 15.3 to 15.3 to 15.3.1 allows an an authenticated user to achieve remote code execution via the Import from GitHub API endpoint
References
- https://security-tracker.debian.org/tracker/CVE-2022-2884
- http://packetstormsecurity.com/files/171628/GitLab-15.3-Remote-Code-Execution.html
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2884.json
- https://gitlab.com/gitlab-org/gitlab/-/issues/371098
- https://hackerone.com/reports/1672388
- https://www.exploit-db.com/exploits/51181
CVSS Scores
version 3.1