Lucene search

K
nvd[email protected]NVD:CVE-2022-2095
HistoryAug 05, 2022 - 4:15 p.m.

CVE-2022-2095

2022-08-0516:15:11
CWE-863
web.nvd.nist.gov
1
gitlab
access control
authenticated user
public key

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

29.7%

An improper access control check in GitLab CE/EE affecting all versions starting from 13.7 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1 allows a malicious authenticated user to view a public project’s Deploy Key’s public fingerprint and name when that key has write permission. Note that GitLab never asks for nor stores the private key.

Affected configurations

NVD
Node
gitlabgitlabRange13.7.015.0.5enterprise
OR
gitlabgitlabRange15.1.015.1.4enterprise
OR
gitlabgitlabMatch15.2enterprise
Node
gitlabgitlabRange13.7.015.0.5community
OR
gitlabgitlabRange15.1.015.1.4community
OR
gitlabgitlabMatch15.2community

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

29.7%