An improper access control check in GitLab CE/EE affecting all versions starting from 13.7 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1 allows a malicious authenticated user to view a public project's Deploy Key's public fingerprint and name when that key has write permission. Note that GitLab never asks for nor stores the private key.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/365415 | broken link vendor advisory |
https://hackerone.com/reports/1600325 | third party advisory permissions required |
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2095.json | vendor advisory |