GitLab Runner BR Sanitization RCE before 15.5.2
CVE-2022-2251 Published on January 17, 2023
Improper sanitization of branch names in GitLab Runner affecting all versions prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a user who creates a branch with a specially crafted name and gets another user to trigger a pipeline to execute commands in the runner as that other user.
Vulnerability Analysis
CVE-2022-2251 can be exploited with network access, requires user interaction and a small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
What is a Shell injection Vulnerability?
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
CVE-2022-2251 has been classified to as a Shell injection vulnerability or weakness.
Products Associated with CVE-2022-2251
Want to know whenever a new CVE is published for GitLab Runner? stack.watch will email you.
Affected Versions
GitLab Runner:- Version <15.3.5 is affected.
- Version >=15.4, <15.4.4 is affected.
- Version >=15.5, <15.5.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.