Security News > 2022 > August > Critical RCE bug in GitLab patched, update ASAP! (CVE-2022-2884)
GitLab has fixed a remote code execution vulnerability affecting the Community and the Enterprise Edition of its DevOps platform, and has urged admins to upgrade their GitLab instances immediately.
CVE-2022-2884 is a critical severity issue that may allow an authenticated user to achieve remote code execution via the Import from GitHub API endpoint, the company explained.
Starting from 11.3.4 before 15.1.5.
Since attackers have been known to target unpatched GitLab servers, the company "Strongly recommends" that all installations running a vulnerable version are upgraded to the latest version as soon as possible.
If upgrading is not possible at the moment, there is a stopgap measure that can be implemented: admins can disable GitHub import on their GitLab installation.
GitLab made sure to note that GitLab.com is already running the patched version, and did not waste the opportunity to point admins to a post outlining best practices for securing GitLab instances.
News URL
https://www.helpnetsecurity.com/2022/08/24/cve-2022-2884/
Related news
- Apache issues patches for critical Struts 2 RCE bug (source)
- Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks (source)
- Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-10-17 | CVE-2022-2884 | OS Command Injection vulnerability in Gitlab A vulnerability in GitLab CE/EE affecting all versions from 11.3.4 prior to 15.1.5, 15.2 to 15.2.3, 15.3 to 15.3 to 15.3.1 allows an an authenticated user to achieve remote code execution via the Import from GitHub API endpoint | 9.9 |