mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
100 lines
3.6 KiB
JSON
100 lines
3.6 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2022-2531",
|
|
"ASSIGNER": "cve@gitlab.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "GitLab",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "GitLab",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": ">=12.5, <15.0.5"
|
|
},
|
|
{
|
|
"version_value": ">=15.1, <15.1.4"
|
|
},
|
|
{
|
|
"version_value": ">=15.2, <15.2.1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Improper limitation of a pathname to a restricted directory ('path traversal') in GitLab"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/364252",
|
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/364252",
|
|
"refsource": "MISC"
|
|
},
|
|
{
|
|
"name": "https://hackerone.com/reports/1566306",
|
|
"url": "https://hackerone.com/reports/1566306",
|
|
"refsource": "MISC"
|
|
},
|
|
{
|
|
"name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2531.json",
|
|
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2531.json",
|
|
"refsource": "CONFIRM"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An issue has been discovered in GitLab EE affecting all versions starting from 12.5 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. GitLab was not performing correct authentication on Grafana API under specific conditions allowing unauthenticated users to perform queries through a path traversal vulnerability."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"version": "3.1",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM"
|
|
}
|
|
},
|
|
"credit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program"
|
|
}
|
|
]
|
|
} |