CVE-2022-1162

Source
https://cve.org/CVERecord?id=CVE-2022-1162
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-1162.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-1162
Aliases
Downstream
Published
2022-04-04T19:46:14Z
Modified
2026-02-17T22:15:37.365017Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts

Database specific
{
    "cna_assigner": "GitLab",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/1xxx/CVE-2022-1162.json"
}
References

Affected packages

Git / gitlab.com/gitlab-org/gitlab

Affected versions

v14.*
v14.7.0-ee
v14.7.1-ee
v14.7.2-ee
v14.7.3-ee
v14.7.4-ee
v14.7.5-ee
v14.7.6-ee
v14.8.0-ee
v14.8.1-ee
v14.8.2-ee
v14.8.3-ee
v14.8.4-ee
v14.9.0-ee
v14.9.1-ee

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-1162.json"