First published: Thu Mar 09 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 12.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. It was possible for a project maintainer to extract a Datadog integration API key by modifying the site.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.1.0<15.7.8 | |
GitLab | >=12.1.0<15.7.8 | |
GitLab | >=15.8.0<15.8.4 | |
GitLab | >=15.8.0<15.8.4 | |
GitLab | >=15.9.0<15.9.2 | |
GitLab | >=15.9.0<15.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0483 is considered a high severity vulnerability due to its potential for unauthorized access to sensitive API keys.
To mitigate CVE-2023-0483, update GitLab to the latest version beyond 15.7.8, 15.8.4, or 15.9.2 as applicable.
CVE-2023-0483 affects all GitLab versions starting from 12.1 to just before 15.7.8, 15.8 to just before 15.8.4, and 15.9 to just before 15.9.2.
If exploited, CVE-2023-0483 allows a project maintainer to extract sensitive Datadog integration API keys, potentially compromising services.
CVE-2023-0483 was recently discovered and affects multiple versions of GitLab before the specified patch releases.