9.8
CVSSv3

CVE-2022-1162

Published: 04/04/2022 Updated: 27/04/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 before 14.7.7, 14.8 before 14.8.5, and 14.9 before 14.9.2 allowing malicious users to potentially take over accounts

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gitlab gitlab

Exploits

Gitlab versions 149 prior to 1492, 148 prior to 1485, and 147 prior to 1477 suffer from a bypass vulnerability due to having set a hardcoded password for accounts registered using an OmniAuth provider ...

Github Repositories

CVE-2022-1162 A hardcoded password was set for accounts registered using an OmniAuth provider (eg OAuth, LDAP, SAML) in GitLab CE/EE versions 147 prior to 1477, 148 prior to 1485, and 149 prior to 1492 allowing attackers to potentially take over accounts Exploit: New Gitlab Accounts (created since the first affect version and if Gitlab is before the patched version)

A ruby on rails script for GitLab to reset password of users

gitlab-password-reset-script A ruby on rails script for GitLab to reset password of users The scripts in here are inspired by the script provided by GitLab: aboutgitlabcom/releases/2022/03/31/critical-security-release-gitlab-14-9-2-released/#script-to-identify-users-potentially-impacted-by-cve-2022-1162 To run a script, place it in /tmp/ and run it Example: sudo gitl

A simple tool to enumerate users in gitlab

CVE-2022-1162 A GitLab TakeOver Tool A simple tool to enumerate users in gitlab and login using CVE-2022-1162 Google Dork intitle:"Sign in · GitLab" Cmd python codepy urlcom Pull Requests are Welcome!

Recent Articles

GitLab issues critical update after hard-coding passwords into accounts
The Register • Thomas Claburn in San Francisco • 01 Jan 1970

Get our weekly newsletter Fixed passphrases for OmniAuth users not such a great idea

GitLab on Thursday issued security updates for three versions of GitLab Community Edition (CE) and Enterprise Edition (EE) software that address, among other flaws, a critical hard-coded password bug. The cloud-hosted software version control service released versions 14.9.2, 14.8.5, and 14.7.7 of its self-hosted CE and EE software, fixing one "critical" security vulnerability (CVE-2022-1162), as well as two rated "high," nine rated "medium," and four rated "low." "A hard-coded password was set ...