An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-51684 An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 28 Feb 2025 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284

cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2025-02-28T17:25:16.373Z

Reserved: 2022-12-07T00:00:00.000Z

Link: CVE-2022-4331

cve-icon Vulnrichment

Updated: 2024-08-03T01:34:50.155Z

cve-icon NVD

Status : Modified

Published: 2023-03-09T22:15:51.447

Modified: 2025-02-28T18:15:25.947

Link: CVE-2022-4331

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.