CVE-2022-4054

An issue has been discovered in GitLab affecting all versions starting from 9.3 before 15.4.6, all versions starting from 15.5 before 15.5.5, all versions starting from 15.6 before 15.6.1. It was possible for a project maintainer to leak a webhook secret token by changing the webhook URL to an endpoint that allows them to capture request headers.
References
Link Resource
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4054.json Vendor Advisory
https://gitlab.com/gitlab-org/gitlab/-/issues/382260 Exploit Issue Tracking Vendor Advisory
https://hackerone.com/reports/1758126 Permissions Required Third Party Advisory
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4054.json Vendor Advisory
https://gitlab.com/gitlab-org/gitlab/-/issues/382260 Exploit Issue Tracking Vendor Advisory
https://hackerone.com/reports/1758126 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:15.6.0:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:15.6.0:*:*:*:enterprise:*:*:*

History

02 Apr 2025, 16:15

Type Values Removed Values Added
CWE CWE-200

21 Nov 2024, 07:34

Type Values Removed Values Added
References () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4054.json - Vendor Advisory () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4054.json - Vendor Advisory
References () https://gitlab.com/gitlab-org/gitlab/-/issues/382260 - Exploit, Issue Tracking, Vendor Advisory () https://gitlab.com/gitlab-org/gitlab/-/issues/382260 - Exploit, Issue Tracking, Vendor Advisory
References () https://hackerone.com/reports/1758126 - Permissions Required, Third Party Advisory () https://hackerone.com/reports/1758126 - Permissions Required, Third Party Advisory
Summary
  • (es) Se ha descubierto un problema en GitLab en el que se ven afectadas todas las versiones de la 9.3 a la 15.4.6, de la 15.5 a la 15.5.5 y de la 15.6 a la 15.6.1. Era posible que un mantenedor de proyecto filtrara un token secreto de webhook cambiando la URL del webhook a un endpoint que les permitiera capturar encabezados de peticiones.

Information

Published : 2023-01-26 21:18

Updated : 2025-04-02 16:15


NVD link : CVE-2022-4054

Mitre link : CVE-2022-4054

CVE.ORG link : CVE-2022-4054


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
NVD-CWE-noinfo CWE-200

Exposure of Sensitive Information to an Unauthorized Actor