
Cloud Vulnerability DB
A community-led vulnerabilities database
GitLab CE/EE versions starting from 10.0 before 15.5.7, 15.6 before 15.6.4, and 15.7 before 15.7.2 were affected by a vulnerability that allowed unauthenticated users to download user avatars using victim's user ID on private instances that restrict public level visibility. The vulnerability was discovered through GitLab's HackerOne bug bounty program by researcher nocasis and was assigned CVE-2022-3870 (GitLab Security).
The vulnerability is an Insecure Direct Object Reference (IDOR) issue that allows unauthorized access to user avatars through a direct URL path. The vulnerable endpoint was '/uploads/-/system/user/avatar/{user_id}/avatar.png', which could be accessed without authentication. The severity was rated as medium with a CVSS score of 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) (GitLab Security).
The vulnerability allowed attackers to enumerate through user IDs and retrieve avatar images without authorization, even in private GitLab instances. This could lead to privacy violations, enabling attackers to gather information about employees through their leaked avatars and potentially determine the number of engineers in an organization (GitLab Issue).
The vulnerability was patched in GitLab versions 15.7.2, 15.6.4, and 15.5.7. Organizations running affected versions were strongly recommended to upgrade to these patched versions immediately. GitLab.com was already running the patched version at the time of disclosure (GitLab Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."