First published: Wed Apr 05 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 13.6 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1, allowing to read environment names supposed to be restricted to project memebers only.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.6.0<15.8.5 | |
GitLab | >=13.6.0<15.8.5 | |
GitLab | >=15.9.0<15.9.4 | |
GitLab | >=15.9.0<15.9.4 | |
GitLab | =15.10.0 | |
GitLab | =15.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0319 has been rated as a high severity vulnerability due to its potential to expose sensitive project environment names.
To fix CVE-2023-0319, upgrade your GitLab installation to version 15.8.5 or later, or to version 15.9.4 or later, or to version 15.10.1 or later depending on your current version.
CVE-2023-0319 affects all GitLab versions starting from 13.6 to 15.8.5, 15.9 to 15.9.4, and 15.10 to 15.10.0.
CVE-2023-0319 allows unauthorized users to read environment names that are supposed to be restricted to project members.
No official workaround is provided for CVE-2023-0319; upgrading to a non-vulnerable version is the recommended action.