Improper Input Validation in GitLab Runner
CVE-2022-2251
4.8MEDIUM
Summary
The security flaw in GitLab Runner arises from inadequate sanitization of branch names, which may allow an attacker to create a branch with a carefully crafted name. If another user subsequently triggers a pipeline related to this branch, malicious commands could be executed within the context of that user's environment, leading to unauthorized actions. This vulnerability affects multiple versions of GitLab Runner and underscores the necessity of proper input validation mechanisms to mitigate such risks.
Affected Version(s)
GitLab Runner <15.3.5 < 15.3.5
GitLab Runner >=15.4, <15.4.4 < 15.4, 15.4.4
GitLab Runner >=15.5, <15.5.2 < 15.5, 15.5.2
References
CVSS V3.1
Score:
4.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Thanks [stanlyoncm](https://hackerone.com/stanlyoncm) for reporting this vulnerability through our HackerOne bug bounty program