First published: Wed May 03 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 13.11 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. It was possible that a project member demoted to a user role to read project updates by doing a diff with a pre-existing fork.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.11<15.8.5 | |
GitLab | >=15.9<15.9.4 | |
GitLab | >=15.11<15.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0485 has been rated as a medium severity vulnerability.
To resolve CVE-2023-0485, upgrade your GitLab instance to version 15.8.5 or later, or to version 15.9.4 or later.
CVE-2023-0485 affects all GitLab versions starting from 13.11 before 15.8.5, all versions from 15.9 before 15.9.4, and all versions from 15.10 before 15.10.1.
CVE-2023-0485 is a security vulnerability that allows a demoted project member to read project updates through specific actions.
There are no official workarounds for CVE-2023-0485; upgrading to a fixed version is the recommended action.