GitLab, a DevOps platform, has issued software upgrades to address a significant security flaw that, if exploited, may allow an adversary to gain control of accounts. The CVE-2022-1162 vulnerability has a CVSS score of 9.1 and was discovered internally by the GitLab team.
"A hardcoded password was set for accounts registered using an OmniAuth provider (e.g., OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2," according to a March 31 advisory from the company.
GitLab also indicated that it reset the passwords of an undefined number of users out of caution after addressing the bug in the most recent releases of GitLab Community Edition (CE) and Enterprise Edition (EE) versions 14.9.2, 14.8.5, and 14.7.7.
Please do not enter any spam link in the comment box.