Skip to main content

CVE-2022-3706: Improper authorization in GitLab in GitLab GitLab

Low
VulnerabilityCVE-2022-3706cvecve-2022-3706
Published: Wed Nov 09 2022 (11/09/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

Improper authorization in GitLab CE/EE affecting all versions from 7.14 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a user retrying a job in a downstream pipeline to take ownership of the retried jobs in the upstream pipeline even if the user doesn't have access to that project.

AI-Powered Analysis

AILast updated: 06/25/2025, 22:58:39 UTC

Technical Analysis

CVE-2022-3706 is a security vulnerability identified in GitLab Community Edition (CE) and Enterprise Edition (EE) affecting versions from 7.14 up to but not including 15.3.5, 15.4 up to but not including 15.4.4, and 15.5 up to but not including 15.5.2. The flaw is an improper authorization issue that allows a user who retries a job in a downstream pipeline to assume ownership of the retried jobs in the upstream pipeline, even if the user lacks access permissions to the upstream project. This vulnerability arises from insufficient access control checks during the retry operation across pipeline boundaries. Specifically, when a job is retried in a downstream pipeline, the system fails to verify whether the user has the necessary rights on the upstream pipeline's project, enabling unauthorized privilege escalation over pipeline jobs. The vulnerability does not impact confidentiality or availability directly but affects integrity by allowing unauthorized modification or control over pipeline jobs. The CVSS 3.1 base score is 3.1 (low severity), reflecting that exploitation requires network access, low privileges, and no user interaction, but with high attack complexity. No known exploits have been reported in the wild to date. The issue was publicly disclosed on November 9, 2022, and patches are available in GitLab versions 15.3.5, 15.4.4, and 15.5.2 and later. This vulnerability is significant in environments where GitLab is used for CI/CD pipelines, as unauthorized job ownership could lead to manipulation of build or deployment processes, potentially injecting malicious code or disrupting development workflows.

Potential Impact

For European organizations, the impact of CVE-2022-3706 primarily concerns the integrity of CI/CD pipelines managed through GitLab. Unauthorized users gaining control over retried jobs in upstream pipelines could alter build artifacts, inject malicious code, or disrupt automated deployment processes. This could lead to compromised software supply chains, introducing backdoors or vulnerabilities into production systems. Organizations relying heavily on GitLab for software development and deployment, especially those in critical infrastructure, finance, healthcare, and government sectors, face increased risk of supply chain attacks or operational disruptions. While the vulnerability does not directly affect confidentiality or availability, the integrity compromise can have cascading effects, including reputational damage, regulatory non-compliance (e.g., GDPR if software integrity impacts personal data processing), and increased remediation costs. The low CVSS score may underestimate the risk in environments where strict pipeline integrity is critical. Additionally, the complexity of the attack and the requirement for some level of user privileges limit exploitation but do not eliminate risk, especially in large organizations with many users and complex project structures.

Mitigation Recommendations

To mitigate CVE-2022-3706, European organizations should prioritize upgrading GitLab instances to versions 15.3.5, 15.4.4, 15.5.2, or later, where the vulnerability is patched. Beyond patching, organizations should implement strict access controls and role-based permissions to limit the number of users authorized to retry jobs, especially in downstream pipelines. Audit and monitor pipeline retry activities to detect anomalous behavior indicative of unauthorized job ownership attempts. Employ network segmentation and restrict GitLab access to trusted networks and users to reduce exposure. Additionally, organizations should review and harden CI/CD pipeline configurations to minimize the impact of compromised jobs, such as using immutable build artifacts and signed deployments. Implementing multi-factor authentication (MFA) for GitLab accounts can reduce the risk of unauthorized access. Finally, conduct regular security training for developers and DevOps teams to raise awareness about pipeline security and the importance of timely patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2022-10-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec4d7

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/25/2025, 10:58:39 PM

Last updated: 8/12/2025, 10:50:51 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats