# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2022-2281 |
|
|
|
2022-07-01 |
2022-07-13 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
An information disclosure vulnerability in GitLab EE affecting all versions from 12.5 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows disclosure of release titles if group milestones are associated with any project releases. |
2 |
CVE-2022-2270 |
276 |
|
|
2022-07-01 |
2022-07-13 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An issue has been discovered in GitLab affecting all versions starting from 12.4 before 14.10.5, all versions starting from 15.0 before 15.0.4, all versions starting from 15.1 before 15.1.1. GitLab was leaking Conan packages names due to incorrect permissions verification. |
3 |
CVE-2022-2250 |
601 |
|
|
2022-07-01 |
2022-07-13 |
5.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
None |
An open redirect vulnerability in GitLab EE/CE affecting all versions from 11.1 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows an attacker to redirect users to an arbitrary location if they trust the URL. |
4 |
CVE-2022-2244 |
863 |
|
|
2022-07-01 |
2022-07-13 |
4.0 |
None |
Remote |
Low |
??? |
None |
Partial |
None |
An improper authorization vulnerability in GitLab EE/CE affecting all versions from 14.8 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows project memebers with reporter role to manage issues in project's error tracking feature. |
5 |
CVE-2022-2243 |
863 |
|
|
2022-07-01 |
2022-07-13 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
An access control vulnerability in GitLab EE/CE affecting all versions from 14.8 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows authenticated users to enumerate issues in non-linked sentry projects. |
6 |
CVE-2022-2235 |
79 |
|
XSS |
2022-07-01 |
2022-07-13 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
Insufficient sanitization in GitLab EE's external issue tracker affecting all versions from 14.5 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to perform cross-site scripting when a victim clicks on a maliciously crafted ZenTao link |
7 |
CVE-2022-2230 |
79 |
|
Exec Code XSS |
2022-07-01 |
2022-07-13 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
A Stored Cross-Site Scripting vulnerability in the project settings page in GitLab CE/EE affecting all versions from 14.4 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows an attacker to execute arbitrary JavaScript code in GitLab on a victim's behalf. |
8 |
CVE-2022-2229 |
863 |
|
|
2022-07-01 |
2022-07-13 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An improper authorization issue in GitLab CE/EE affecting all versions from 13.7 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to extract the value of an unprotected variable they know the name of in public projects or private projects they're a member of. |
9 |
CVE-2022-2228 |
|
|
+Info |
2022-07-01 |
2022-07-13 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
Information exposure in GitLab EE affecting all versions from 12.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker with the appropriate access tokens to obtain CI variables in a group with using IP-based access restrictions even if the GitLab Runner is calling from outside the allowed IP range |
10 |
CVE-2022-2227 |
732 |
|
|
2022-07-01 |
2022-07-08 |
3.5 |
None |
Remote |
Medium |
??? |
Partial |
None |
None |
Improper access control in the runner jobs API in GitLab CE/EE affecting all versions prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows a previous maintainer of a project with a specific runner to access job and project meta data under certain conditions |
11 |
CVE-2022-2185 |
732 |
|
Exec Code |
2022-07-01 |
2022-07-19 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
A critical issue has been discovered in GitLab affecting all versions starting from 14.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 where an authenticated user authorized to import projects could import a maliciously crafted project leading to remote code execution. |
12 |
CVE-2022-1999 |
|
|
|
2022-07-01 |
2022-07-13 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
An issue has been discovered in GitLab CE/EE affecting all versions from 8.13 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1. Under certain conditions, using the REST API an unprivileged user was able to change labels description. |
13 |
CVE-2022-1983 |
668 |
|
|
2022-07-01 |
2022-07-08 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
Incorrect authorization in GitLab EE affecting all versions from 10.7 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allowed an attacker already in possession of a valid Deploy Key or a Deploy Token to misuse it from any location to access Container Registries even when IP address restrictions were configured. |
14 |
CVE-2022-1981 |
863 |
|
Bypass |
2022-07-01 |
2022-07-13 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
An issue has been discovered in GitLab EE affecting all versions starting from 12.2 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1. In GitLab, if a group enables the setting to restrict access to users belonging to specific domains, that allow-list may be bypassed if a Maintainer uses the 'Invite a group' feature to invite a group that has members that don't comply with domain allow-list. |
15 |
CVE-2022-1963 |
|
|
|
2022-07-01 |
2022-07-13 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4 before 14.10.5, all versions starting from 15.0 before 15.0.4, all versions starting from 15.1 before 15.1.1. GitLab reveals if a user has enabled two-factor authentication on their account in the HTML source, to unauthenticated users. |
16 |
CVE-2022-1954 |
|
|
DoS |
2022-07-01 |
2022-07-13 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
A Regular Expression Denial of Service vulnerability in GitLab CE/EE affecting all versions from 1.0.2 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to make a GitLab instance inaccessible via specially crafted web server response headers |
17 |
CVE-2022-1944 |
863 |
|
|
2022-06-06 |
2022-06-13 |
4.9 |
None |
Remote |
Medium |
??? |
Partial |
Partial |
None |
When the feature is configured, improper authorization in the Interactive Web Terminal in GitLab CE/EE affecting all versions from 11.3 prior to 14.9.5, 14.10 prior to 14.10.4, and 15.0 prior to 15.0.1 allows users with the Developer role to open terminals on other Developers' running jobs |
18 |
CVE-2022-1940 |
79 |
|
Exec Code XSS |
2022-06-06 |
2022-06-13 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
A Stored Cross-Site Scripting vulnerability in Jira integration in GitLab EE affecting all versions from 13.11 prior to 14.9.5, 14.10 prior to 14.10.4, and 15.0 prior to 15.0.1 allows an attacker to execute arbitrary JavaScript code in GitLab on a victim's behalf via specially crafted Jira Issues |
19 |
CVE-2022-1936 |
863 |
|
|
2022-06-06 |
2022-06-13 |
4.0 |
None |
Remote |
Low |
??? |
None |
Partial |
None |
Incorrect authorization in GitLab EE affecting all versions from 12.0 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1 allowed an attacker already in possession of a valid Project Deploy Token to misuse it from any location even when IP address restrictions were configured |
20 |
CVE-2022-1935 |
863 |
|
|
2022-06-06 |
2022-06-13 |
4.0 |
None |
Remote |
Low |
??? |
None |
Partial |
None |
Incorrect authorization in GitLab EE affecting all versions from 12.0 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1 allowed an attacker already in possession of a valid Project Trigger Token to misuse it from any location even when IP address restrictions were configured |
21 |
CVE-2022-1821 |
400 |
|
|
2022-06-06 |
2022-06-13 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.8 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1. It may be possible for a subgroup member to access the members list of their parent group. |
22 |
CVE-2022-1783 |
400 |
|
|
2022-06-06 |
2022-06-13 |
4.0 |
None |
Remote |
Low |
??? |
None |
Partial |
None |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.3 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1. It may be possible for malicious group maintainers to add new members to a project within their group, through the REST API, even after their group owner enabled a setting to prevent members from being added to projects within that group. |
23 |
CVE-2022-1680 |
|
|
|
2022-06-06 |
2022-06-17 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
An account takeover issue has been discovered in GitLab EE affecting all versions starting from 11.10 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1. When group SAML SSO is configured, the SCIM feature (available only on Premium+ subscriptions) may allow any owner of a Premium group to invite arbitrary users through their username and email, then change those users' email addresses via SCIM to an attacker controlled email address and thus - in the absence of 2FA - take over those accounts. It is also possible for the attacker to change the display name and username of the targeted account. |
24 |
CVE-2022-1545 |
863 |
|
|
2022-05-11 |
2022-05-18 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
It was possible to disclose details of confidential notes created via the API in Gitlab CE/EE affecting all versions from 13.2 prior to 14.8.6, 14.9 prior to 14.9.4, and 14.10 prior to 14.10.1 if an unauthorised project member was tagged in the note. |
25 |
CVE-2022-1510 |
770 |
|
|
2022-05-11 |
2022-05-18 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue has been discovered in GitLab affecting all versions starting from 13.9 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not correctly handling malicious text in the CI Editor and CI Pipeline details page allowing the attacker to cause uncontrolled resource consumption. |
26 |
CVE-2022-1460 |
287 |
|
|
2022-05-11 |
2022-05-18 |
4.0 |
None |
Remote |
Low |
??? |
None |
Partial |
None |
An issue has been discovered in GitLab affecting all versions starting from 9.2 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not performing correct authorizations on scheduled pipelines allowing a malicious user to run a pipeline in the context of another user. |
27 |
CVE-2022-1433 |
79 |
|
XSS |
2022-05-11 |
2022-05-18 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
An issue has been discovered in GitLab affecting all versions starting from 14.4 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. Missing invalidation of Markdown caching causes potential payloads from a previously exploitable XSS vulnerability (CVE-2022-1175) to persist and execute. |
28 |
CVE-2022-1431 |
400 |
|
|
2022-05-10 |
2022-05-18 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue has been discovered in GitLab affecting all versions starting from 12.10 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not correctly handling malicious requests to the PyPi API endpoint allowing the attacker to cause uncontrolled resource consumption. |
29 |
CVE-2022-1428 |
770 |
|
|
2022-05-11 |
2022-05-18 |
4.0 |
None |
Remote |
Low |
??? |
None |
None |
Partial |
An issue has been discovered in GitLab affecting all versions before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was incorrectly verifying throttling limits for authenticated package requests which resulted in limits not being enforced. |
30 |
CVE-2022-1426 |
287 |
|
|
2022-05-11 |
2022-05-18 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
An issue has been discovered in GitLab affecting all versions starting from 12.6 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not correctly authenticating a user that had some certain amount of information which allowed an user to authenticate without a personal access token. |
31 |
CVE-2022-1423 |
863 |
|
Exec Code |
2022-05-19 |
2022-06-02 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
Improper access control in the CI/CD cache mechanism in GitLab CE/EE affecting all versions starting from 1.0.2 before 14.8.6, all versions from 14.9.0 before 14.9.4, and all versions from 14.10.0 before 14.10.1 allows a malicious actor with Developer privileges to perform cache poisoning leading to arbitrary code execution in protected branches |
32 |
CVE-2022-1417 |
863 |
|
|
2022-05-10 |
2022-05-18 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
Improper access control in GitLab CE/EE affecting all versions starting from 8.12 before 14.8.6, all versions starting from 14.9 before 14.9.4, and all versions starting from 14.10 before 14.10.1 allows non-project members to access contents of Project Members-only Wikis via malicious CI jobs |
33 |
CVE-2022-1416 |
79 |
|
XSS |
2022-05-19 |
2022-06-02 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
Missing sanitization of data in Pipeline error messages in GitLab CE/EE affecting all versions starting from 1.0.2 before 14.8.6, all versions from 14.9.0 before 14.9.4, and all versions from 14.10.0 before 14.10.1 allows for rendering of attacker controlled HTML tags and CSS styling |
34 |
CVE-2022-1413 |
668 |
|
|
2022-05-19 |
2022-06-02 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Missing input masking in GitLab CE/EE affecting all versions starting from 1.0.2 before 14.8.6, all versions from 14.9.0 before 14.9.4, and all versions from 14.10.0 before 14.10.1 causes potentially sensitive integration properties to be disclosed in the web interface |
35 |
CVE-2022-1406 |
20 |
|
|
2022-05-11 |
2022-05-18 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
Improper input validation in GitLab CE/EE affecting all versions from 8.12 prior to 14.8.6, all versions from 14.9.0 prior to 14.9.4, and 14.10.0 allows a Developer to read protected Group or Project CI/CD variables by importing a malicious project |
36 |
CVE-2022-1352 |
639 |
|
|
2022-05-11 |
2022-05-19 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Due to an insecure direct object reference vulnerability in Gitlab EE/CE affecting all versions from 11.0 prior to 14.8.6, 14.9 prior to 14.9.4, and 14.10 prior to 14.10.1, an endpoint may reveal the issue title to a user who crafted an API call with the ID of the issue from a public project that restricts access to issue only to project members. |
37 |
CVE-2022-1193 |
863 |
|
|
2022-04-11 |
2022-05-12 |
3.5 |
None |
Remote |
Medium |
??? |
Partial |
None |
None |
Improper access control in GitLab CE/EE versions 10.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allows a malicious actor to obtain details of the latest commit in a private project via Merge Requests under certain circumstances |
38 |
CVE-2022-1190 |
79 |
|
XSS |
2022-04-04 |
2022-04-11 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
Improper handling of user input in GitLab CE/EE versions 8.3 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowed an attacker to exploit a stored XSS by abusing multi-word milestone references in issue descriptions, comments, etc. |
39 |
CVE-2022-1189 |
|
|
|
2022-04-04 |
2022-04-11 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.2 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 that allowed for an unauthorised user to read the the approval rules of a private project. |
40 |
CVE-2022-1188 |
918 |
|
|
2022-04-04 |
2022-04-11 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.1 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 where a blind SSRF attack through the repository mirroring feature was possible. |
41 |
CVE-2022-1185 |
400 |
|
DoS |
2022-04-04 |
2022-04-11 |
4.0 |
None |
Remote |
Low |
??? |
None |
None |
Partial |
A denial of service vulnerability when rendering RDoc files in GitLab CE/EE versions 10 to 14.7.7, 14.8.0 to 14.8.5, and 14.9.0 to 14.9.2 allows an attacker to crash the GitLab web application with a maliciously crafted RDoc file |
42 |
CVE-2022-1175 |
79 |
|
XSS |
2022-04-04 |
2022-05-10 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Improper neutralization of user input in GitLab CE/EE versions 14.4 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 allowed an attacker to exploit XSS by injecting HTML in notes. |
43 |
CVE-2022-1174 |
400 |
|
|
2022-04-04 |
2022-04-11 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
A potential DoS vulnerability was discovered in Gitlab CE/EE versions 13.7 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 allowed an attacker to trigger high CPU usage via a special crafted input added in Issues, Merge requests, Milestones, Snippets, Wiki pages, etc. |
44 |
CVE-2022-1162 |
798 |
|
|
2022-04-04 |
2022-04-27 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts |
45 |
CVE-2022-1157 |
532 |
|
|
2022-04-11 |
2022-04-18 |
3.5 |
None |
Remote |
Medium |
??? |
Partial |
None |
None |
Missing sanitization of logged exception messages in all versions prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 of GitLab CE/EE causes potential sensitive values in invalid URLs to be logged |
46 |
CVE-2022-1148 |
287 |
|
|
2022-04-04 |
2022-04-11 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
Improper authorization in GitLab Pages included with GitLab CE/EE affecting all versions from 11.5 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowed an attacker to steal a user's access token on an attacker-controlled private GitLab Pages website and reuse that token on the victim's other private websites |
47 |
CVE-2022-1124 |
863 |
|
|
2022-05-11 |
2022-05-18 |
3.5 |
None |
Remote |
Medium |
??? |
Partial |
None |
None |
An improper authorization issue has been discovered in GitLab CE/EE affecting all versions prior to 14.8.6, all versions from 14.9.0 prior to 14.9.4, and 14.10.0, allowing Guest project members to access trace log of jobs when it is enabled |
48 |
CVE-2022-1121 |
770 |
|
|
2022-04-04 |
2022-04-11 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
A lack of appropriate timeouts in GitLab Pages included in GitLab CE/EE all versions prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allows an attacker to cause unlimited resource consumption. |
49 |
CVE-2022-1120 |
209 |
|
|
2022-04-04 |
2022-04-11 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
Missing filtering in an error message in GitLab CE/EE affecting all versions prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 exposed sensitive information when an include directive fails in the CI/CD configuration. |
50 |
CVE-2022-1111 |
668 |
|
|
2022-04-04 |
2022-04-11 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
A business logic error in Project Import in GitLab CE/EE versions 14.9 prior to 14.9.2, 14.8 prior to 14.8.5, and 14.0 prior to 14.7.7 under certain conditions caused imported projects to show an incorrect user in the 'Access Granted' column in the project membership pages |