--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Remote Command Execution Vulnerability in Gitlab' version: '1.0' number: '2022-062' original_date: 'August 22, 2022' date: 'August 25, 2022' --- _History:_ * _25/08/2022 --- v1.0 -- Initial publication_ # Summary On the 22nd of August 2022, GitLab released a security advisory regarding a Remote Command Execution affecting its products. This vulnerability exists in the `import via Github` functionality [1]. Exploiting this vulnerability, allows an authenticated user to achieve remote code execution on the affected server. # Details The vulnerability is identified as **`CVE-2022-2884`** and has a severity score of 9.9 out of 10. [2] The issue is now mitigated in the latest release versions 15.3.1, 15.2.3, 15.1.5 for GitLab Community Edition (CE) and Enterprise Edition (EE). # Affected Products * GitLab CE/EE - from 11.3.4 before 15.1.5 * GitLab CE/EE - from 15.2 before 15.2.3 * GitLab CE/EE - from 15.3 before 15.3.1 # Workarounds There is an available workaround to mitigate this vulnerability which consists in disabling GitHub import. Detailed information is available on the vendor's page. [1] # Recommendations CERT-EU strongly recommends applying the latest updates as soon as possible. # References [1] [2]