GitLab Fixes Critical Severity Flaw That Allows Attackers To Take Over Accounts

GitLab has fixed a critical severity flaw tracked as CVE-2022-1162 affecting both GitLab Community Edition (CE) and Enterprise Edition (EE).

GitLab said it reset the passwords of a limited number of users as part of the CVE 2022-1162 mitigation effort.

The vulnerability allows remote attackers to take over user accounts with strongly encrypted passwords. The flaw surfaced from static passwords accidentally set during OmniAuth-based registration in GitLab CE/EE.

GitLab recommended users to upgrade to the latest versions (14.9.2, 14.8.5, or 14.7.7) to limit attacks from the exploited vulnerability.

“We executed a reset of passwords for a selected set of users starting at 15:38 UTC. Our investigation shows no indication that users or accounts have been compromised, but we’re taking precautionary measures for our users’ security,” the GitLab team said.

GitLab explained that no user accounts have been compromised, and after potentially affected user accounts are identified, administrators are advised to reset user passwords.

IT World Canada Staff
IT World Canada Staff
The online resource for Canadian Information Technology professionals.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

ITW in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

More Best of The Web