GitLab.CE.EE.GitHub.Import.CVE-2022-2992.Remote.Code.Execution

description-logoDescription

This indicates an attack attempt to exploit an Input Validation Error Vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE).
The vulnerability is due to due to improper handling of the data returned while running the import. A remote, authenticated attacker can exploit this vulnerability by initiating a GitHub import on a target server to an attacker controlled GitHub server. Successful exploitation could result in the execution of arbitrary commands in the security context of the Redis service on the target server.

affected-products-logoAffected Products

GitLab GitLab Community Edition (CE) and Enterprise Edition (EE) 11.10.x through 15.1.6
GitLab GitLab Community Edition (CE) and Enterprise Edition (EE) 15.2.x prior to 15.2.4
GitLab GitLab Community Edition (CE) and Enterprise Edition (EE) 15.3.x prior to 15.3.2

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2992.json

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-01-19 22.480 Default_action:pass:drop
2023-01-10 22.473