First published: Wed Mar 21 2018(Updated: )
Gitlab Community Edition version 10.3 is vulnerable to an improper authorization issue in the deployment keys component resulting in unauthorized use of deployment keys by guest users.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.16.0<=9.5.10 | |
GitLab | >=8.16.0<=9.5.10 | |
GitLab | >=10.0.0<=10.1.5 | |
GitLab | >=10.0.0<=10.1.5 | |
GitLab | >=10.2.0<=10.2.5 | |
GitLab | >=10.2.0<=10.2.5 | |
GitLab | >=10.3.0<=10.3.3 | |
GitLab | >=10.3.0<=10.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0927 is rated as a medium severity vulnerability due to improper authorization issues.
To fix CVE-2017-0927, upgrade GitLab to version 10.3.4 or later.
CVE-2017-0927 affects versions of GitLab Community and Enterprise Edition from 8.16.0 to 10.3.3.
CVE-2017-0927 is an improper authorization vulnerability in the deployment keys component.
Yes, guest users can potentially exploit CVE-2017-0927 to access unauthorized deployment keys.