Lucene search

K
zdtGreenwolf1337DAY-ID-37666
HistoryApr 26, 2022 - 12:00 a.m.

Gitlab 14.9 - Authentication Bypass Vulnerability

2022-04-2600:00:00
greenwolf
0day.today
208

0.296 Low

EPSS

Percentile

97.0%

# Exploit Title: Gitlab 14.9 - Authentication Bypass
# Exploit Authors: Greenwolf & stacksmashing
# Vendor Homepage: https://about.gitlab.com/
# Software Link: https://about.gitlab.com/install
# Version: GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2
# Tested on: Linux
# CVE : CVE-2022-1162
# References: https://github.com/Greenwolf/CVE-2022-1162

A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts.

Exploit:

New Gitlab Accounts (created since the first affect version and if Gitlab is before the patched version) can be logged into with the following password:

[emailΒ protected]#000000000