CVE | CVE-2022-4331 |
CVE Title | |
Published Date | 2023-03-09T22:15Z |
Modified Date | 2023-03-15T15:36Z |
CWE Type | NVD-CWE-noinfo |
CVSS 3.x | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N |
Description | An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group. |
References | |
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites. | |
Reference URL | https://hackerone.com/reports/1791518 |
Reference Description | MISC https://hackerone.com/reports/1791518 |
Reference URL | https://gitlab.com/gitlab-org/gitlab/-/issues/385050 |
Reference Description | MISC https://gitlab.com/gitlab-org/gitlab/-/issues/385050 |
Reference URL | https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4331.json |
Reference Description | CONFIRM https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4331.json |
Tags | Permissions Required |
Sources | NIST MITRE |