First published: Wed Apr 05 2023(Updated: )
An issue has been discovered in GitLab affecting versions starting from 15.1 before 15.8.5, 15.9 before 15.9.4, and 15.10 before 15.10.1. A maintainer could modify a webhook URL to leak masked webhook secrets by adding a new parameter to the url. This addresses an incomplete fix for CVE-2022-4342.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=15.1.0<15.8.5 | |
GitLab | >=15.1.0<15.8.5 | |
GitLab | >=15.9.0<15.9.4 | |
GitLab | >=15.9.0<15.9.4 | |
GitLab | =15.10.0 | |
GitLab | =15.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0838 is rated as a medium severity vulnerability in GitLab.
To fix CVE-2023-0838, upgrade to GitLab versions 15.8.5, 15.9.4, or 15.10.1 or later.
CVE-2023-0838 affects GitLab versions starting from 15.1 and before 15.8.5, 15.9 and before 15.9.4, and 15.10 and before 15.10.1.
CVE-2023-0838 involves a vulnerability that allows a maintainer to modify a webhook URL, potentially leaking masked webhook secrets.
Yes, CVE-2023-0838 addresses an incomplete fix for the previously reported CVE-2022-4342.