Learn about the CVE-2022-1111 affecting GitLab versions prior to 14.9.2, 14.8.5, and 14.7.7, causing incorrect user display in project membership pages. Find mitigation steps here.
A business logic error in Project Import in GitLab versions prior to 14.9.2, 14.8.5, and 14.7.7 caused imported projects to display an incorrect user in the 'Access Granted' column in project membership pages.
Understanding CVE-2022-1111
This CVE involves a business logic error in GitLab that affects the correct display of users in project membership pages under certain conditions.
What is CVE-2022-1111?
The vulnerability in GitLab versions 14.9 prior to 14.9.2, 14.8 prior to 14.8.5, and 14.0 prior to 14.7.7 led to imported projects showing incorrect user information in the 'Access Granted' column.
The Impact of CVE-2022-1111
With a CVSS base score of 2.4 (Low severity), this vulnerability required high privileges for exploitation and could result in incorrect user data being displayed in project membership pages.
Technical Details of CVE-2022-1111
This section provides detailed technical information about the vulnerability.
Vulnerability Description
A business logic error in GitLab's Project Import functionality caused incorrect user data to be displayed in project membership pages.
Affected Systems and Versions
GitLab Community Edition (CE) and Enterprise Edition (EE) versions 14.9 to 14.9.2, 14.8 to 14.8.5, and 14.0 to 14.7.7 were affected by this vulnerability.
Exploitation Mechanism
The vulnerability exploits a business logic error during the project import process, leading to the incorrect display of user information.
Mitigation and Prevention
To address CVE-2022-1111, immediate action and long-term security practices are recommended.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
GitLab has released patches in versions 14.9.2, 14.8.5, and 14.7.7 to address this vulnerability.