Skip to main content

CVE-2022-3285: Improper access control in GitLab in GitLab GitLab

Medium
VulnerabilityCVE-2022-3285cvecve-2022-3285
Published: Wed Nov 09 2022 (11/09/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

Bypass of healthcheck endpoint allow list affecting all versions from 12.0 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows an unauthorized attacker to prevent access to GitLab

AI-Powered Analysis

AILast updated: 06/25/2025, 22:58:51 UTC

Technical Analysis

CVE-2022-3285 is a medium-severity vulnerability affecting GitLab versions from 12.0 up to but not including 15.2.5, versions 15.3 up to 15.3.4, and versions 15.4 up to 15.4.1. The vulnerability arises due to improper access control in the healthcheck endpoint allow list. Specifically, an attacker can bypass the allow list that is intended to restrict access to the healthcheck endpoint. This endpoint is typically used to verify the operational status of the GitLab service. By exploiting this bypass, an unauthorized attacker can interfere with the healthcheck mechanism, potentially preventing legitimate access to GitLab services. The vulnerability does not require authentication or user interaction, and it can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and the scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. The impact is limited to availability (A:L), with no impact on confidentiality or integrity. There are no known exploits in the wild as of the published date (November 9, 2022). The vulnerability was assigned a CVSS v3.1 base score of 5.3, reflecting a medium severity level. This vulnerability could be leveraged to cause denial of service conditions by preventing access to GitLab, which is a widely used DevOps platform for source code management, CI/CD pipelines, and project collaboration.

Potential Impact

For European organizations, the impact of CVE-2022-3285 can be significant, especially for those relying heavily on GitLab for software development and deployment workflows. Disruption of GitLab availability can halt development pipelines, delay software releases, and impede collaboration among development teams. This can lead to operational downtime and potential financial losses. Organizations in sectors with strict compliance and regulatory requirements (e.g., finance, healthcare, critical infrastructure) may face additional risks if development and deployment processes are interrupted. Although the vulnerability does not expose confidential data or allow code tampering, the denial of service aspect can indirectly affect business continuity and incident response capabilities. Given GitLab's role in managing source code repositories and CI/CD automation, prolonged unavailability could also delay security patch deployments and updates, increasing exposure to other threats.

Mitigation Recommendations

To mitigate CVE-2022-3285, European organizations should prioritize upgrading GitLab instances to patched versions: 15.2.5 or later for the 15.2 branch, 15.3.4 or later for the 15.3 branch, and 15.4.1 or later for the 15.4 branch. Until upgrades are applied, organizations should restrict network access to the healthcheck endpoint by implementing strict firewall rules or network segmentation to limit exposure to trusted IP addresses only. Monitoring and logging access to the healthcheck endpoint can help detect anomalous or unauthorized requests indicative of exploitation attempts. Additionally, organizations should review and harden access control configurations related to GitLab endpoints and consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block suspicious traffic targeting the healthcheck endpoint. Regular vulnerability scanning and penetration testing focused on GitLab deployments can help identify residual risks. Finally, maintaining an incident response plan that includes procedures for GitLab service disruptions will improve resilience against denial of service conditions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2022-09-23T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec4ba

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/25/2025, 10:58:51 PM

Last updated: 7/30/2025, 8:54:20 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats