GitLab has fixed a critical severity flaw tracked as CVE-2022-1162 affecting both GitLab Community Edition (CE) and Enterprise Edition (EE).
GitLab said it reset the passwords of a limited number of GitLab.com users as part of the CVE 2022-1162 mitigation effort.
The vulnerability allows remote attackers to take over user accounts with strongly encrypted passwords. The flaw surfaced from static passwords accidentally set during OmniAuth-based registration in GitLab CE/EE.
GitLab recommended users to upgrade to the latest versions (14.9.2, 14.8.5, or 14.7.7) to limit attacks from the exploited vulnerability.
“We executed a reset of GitLab.com passwords for a selected set of users starting at 15:38 UTC. Our investigation shows no indication that users or accounts have been compromised, but we’re taking precautionary measures for our users’ security,” the GitLab team said.
GitLab explained that no user accounts have been compromised, and after potentially affected user accounts are identified, administrators are advised to reset user passwords.
For more information, read the original story in BleepingComputer.