4.3

CVE-2022-2095

An improper access control check in GitLab CE/EE affecting all versions starting from 13.7 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1 allows a malicious authenticated user to view a public project's Deploy Key's public fingerprint and name when that key has write permission. Note that GitLab never asks for nor stores the private key.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GitlabGitlab SwEditionenterprise Version >= 13.7.0 < 15.0.5
GitlabGitlab SwEditionenterprise Version >= 15.1.0 < 15.1.4
GitlabGitlab Version15.2 SwEditionenterprise
GitlabGitlab SwEditioncommunity Version >= 13.7.0 < 15.0.5
GitlabGitlab SwEditioncommunity Version >= 15.1.0 < 15.1.4
GitlabGitlab Version15.2 SwEditioncommunity
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.78% 0.729
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cve@gitlab.com 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CWE-863 Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.