Improper Input Validation in GitLab Runner
CVE-2022-2251
8HIGH
Summary
The security flaw in GitLab Runner arises from inadequate sanitization of branch names, which may allow an attacker to create a branch with a carefully crafted name. If another user subsequently triggers a pipeline related to this branch, malicious commands could be executed within the context of that user's environment, leading to unauthorized actions. This vulnerability affects multiple versions of GitLab Runner and underscores the necessity of proper input validation mechanisms to mitigate such risks.
Affected Version(s)
GitLab Runner <15.3.5 < 15.3.5
GitLab Runner >=15.4, <15.4.4 < 15.4, 15.4.4
GitLab Runner >=15.5, <15.5.2 < 15.5, 15.5.2
References
EPSS Score
8% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Thanks [stanlyoncm](https://hackerone.com/stanlyoncm) for reporting this vulnerability through our HackerOne bug bounty program