### [CVE-2022-0090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0090) ![](https://img.shields.io/static/v1?label=Product&message=GitLab&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Download%20of%20code%20without%20integrity%20check%20in%20GitLab&color=brighgreen) ### Description An issue has been discovered affecting GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1. GitLab is configured in a way that it doesn't ignore replacement references with git sub-commands, allowing a malicious user to spoof the contents of their commits in the UI. ### POC #### Reference - https://gitlab.com/gitlab-org/gitaly/-/issues/3948 #### Github No PoCs found on GitHub currently.