GitLab Patch Critical RCE Flaws (CVE-2022-2884)

A vulnerability in GitLab CE/EE affects all versions starting from 11.3.4 before 15.1.5, all versions starting from 15.2 before 15.2.3, and all versions starting from 15.3 before 15.3.1 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint. This is a Critical severity issue with a CVSS score of 9.9 out of 10. It is now mitigated in the latest release and is assigned CVE-2022-2884.


If you’re unable to upgrade right away, you can secure your GitLab installation against this vulnerability using the workaround outlined below until you have time to upgrade.

Disable GitHub import

Login using an administrator account to your GitLab installation and perform the following:

  1. Click “Menu” -> “Admin”.
  2. Click “Settings” -> “General”.
  3. Expand the “Visibility and access controls” tab.
  4. Under “Import sources” disable the “GitHub” option.
  5. Click “Save changes”.

Verifying the workaround

  1. In a browser window, login as any user.
  2. Click “+” on the top bar.
  3. Click “New project/repository”.
  4. Click “Import project”.
  5. Verify that “GitHub” does not appear as an import option.

This post was created with our nice and easy submission form. Create your post!

What do you think?

Posted by SH

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

MagicWeb: NOBELIUM’s post-compromise trick to authenticate as an

Linux Kernel Exploit (CVE-2022-32250) with mqueue