Arbitrary Code Injection Affecting gitlab package, versions <15.10.8+ds1-2
Threat Intelligence
EPSS
2.38% (91st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-GITLAB-3011548
- published 31 Aug 2022
- disclosed 17 Oct 2022
Introduced: 31 Aug 2022
CVE-2022-2992 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
gitlab
to version 15.10.8+ds1-2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gitlab
package and not the gitlab
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
A vulnerability in GitLab CE/EE affecting all versions from 11.10 prior to 15.1.6, 15.2 to 15.2.4, 15.3 to 15.3.2 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint.
References
- https://security-tracker.debian.org/tracker/CVE-2022-2992
- http://packetstormsecurity.com/files/171008/GitLab-GitHub-Repo-Import-Deserialization-Remote-Code-Execution.html
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2992.json
- https://gitlab.com/gitlab-org/gitlab/-/issues/371884
- https://hackerone.com/reports/1679624
CVSS Scores
version 3.1