An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/385050 | broken link |
https://hackerone.com/reports/1791518 | permissions required |
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4331.json | vendor advisory |