| Vulnerability Name: | CVE-2022-1680 (CCN-228048) | ||||||||||||
| Assigned: | 2022-06-01 | ||||||||||||
| Published: | 2022-06-01 | ||||||||||||
| Updated: | 2022-06-17 | ||||||||||||
| Summary: | An account takeover issue has been discovered in GitLab EE affecting all versions starting from 11.10 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1. When group SAML SSO is configured, the SCIM feature (available only on Premium+ subscriptions) may allow any owner of a Premium group to invite arbitrary users through their username and email, then change those users' email addresses via SCIM to an attacker controlled email address and thus - in the absence of 2FA - take over those accounts. It is also possible for the attacker to change the display name and username of the targeted account. | ||||||||||||
| CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-noinfo | ||||||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2022-1680 Source: CCN Type: GitLab Web site GitLab Critical Security Release: 15.0.1, 14.10.4, and 14.9.5 Source: XF Type: UNKNOWN gitlab-cve20221680-sec-bypass(228048) Source: CONFIRM Type: Vendor Advisory https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1680.json Source: MISC Type: Broken Link https://gitlab.com/gitlab-org/gitlab/-/issues/363058 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||