CVE-2022-4331

high

Description

An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group.

References

https://hackerone.com/reports/1791518

https://gitlab.com/gitlab-org/gitlab/-/issues/385050

https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4331.json

Details

Source: Mitre, NVD

Published: 2023-03-09

Updated: 2023-03-15

Risk Information

CVSS v2

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:N

Severity: High

CVSS v3

Base Score: 7.3

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

Severity: High