Описание
A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts
Ссылки
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Broken Link
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Broken Link
Уязвимые конфигурации
Одно из
EPSS
9.1 Critical
CVSS3
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
Связанные уязвимости
A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts
A hardcoded password was set for accounts registered using an OmniAuth ...
A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts
Уязвимость программной платформы для совместной работы над кодом GitLab, связанная с установкой предопределённых (hardcoded) паролей для учётных записей, зарегистрированных с использованием провайдера OmniAuth (OAuth, LDAP и SAML), позволяющая нарушителю получить доступ к учетным записям пользователей
EPSS
9.1 Critical
CVSS3
9.8 Critical
CVSS3
7.5 High
CVSS2