Exploit Report

Computer Security And Bug Information

CVE-2022-4331

CVECVE-2022-4331
CVE Title
Published Date2023-03-09T22:15Z
Modified Date2023-03-15T15:36Z
CWE TypeNVD-CWE-noinfo
CVSS 3.xCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
DescriptionAn issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group.
References
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://hackerone.com/reports/1791518
Reference DescriptionMISC https://hackerone.com/reports/1791518
Reference URLhttps://gitlab.com/gitlab-org/gitlab/-/issues/385050
Reference DescriptionMISC https://gitlab.com/gitlab-org/gitlab/-/issues/385050
Reference URLhttps://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4331.json
Reference DescriptionCONFIRM https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4331.json
TagsPermissions Required
Sources NIST MITRE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles