Learn about CVE-2022-1999, a Low severity vulnerability in GitLab versions 8.13 to 15.1.1 allowing unprivileged users to modify label descriptions. Find mitigation steps here.
This article discusses CVE-2022-1999, an issue discovered in GitLab affecting various versions. Learn about the impact, technical details, and mitigation steps.
Understanding CVE-2022-1999
CVE-2022-1999 is a vulnerability found in GitLab software versions that allows unprivileged users to modify label descriptions via the REST API.
What is CVE-2022-1999?
The vulnerability affects GitLab versions from 8.13 to 14.10.5, 15.0 to 15.0.4, and 15.1 to 15.1.1, exposing a risk of unauthorized label changes by certain users.
The Impact of CVE-2022-1999
With a CVSS base score of 3.1 (Low severity), the vulnerability poses a threat of integrity impact by enabling unauthorized modifications to label descriptions under specific conditions.
Technical Details of CVE-2022-1999
The vulnerability arises from improper authorization controls within GitLab software, leading to the unauthorized modification of labels.
Vulnerability Description
GitLab CE/EE versions from 8.13 to 14.10.5, 15.0 to 15.0.4, and 15.1 to 15.1.1 are susceptible to unauthorized changes to labels via the REST API.
Affected Systems and Versions
All GitLab versions mentioned above are impacted by this vulnerability, risking unauthorized alterations to label descriptions by unprivileged users.
Exploitation Mechanism
The vulnerability allows unprivileged users to manipulate label descriptions using the GitLab REST API, bypassing proper authorization checks.
Mitigation and Prevention
To secure your GitLab instance, immediate action and long-term security practices are essential to reduce the risk of exploitation.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security updates and patches released by GitLab to address known vulnerabilities promptly.