First published: Thu Mar 09 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A malicious project Maintainer may create a Project Access Token with Owner level privileges using a crafted request.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <15.7.8 | |
GitLab | <15.7.8 | |
GitLab | >=15.8.0<15.8.4 | |
GitLab | >=15.8.0<15.8.4 | |
GitLab | >=15.9.0<15.9.2 | |
GitLab | >=15.9.0<15.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1084 has been classified as a critical vulnerability due to its potential to allow project maintainers to create Project Access Tokens with owner-level privileges.
To address CVE-2023-1084, upgrade GitLab to version 15.7.8 or to a version 15.8.4 and above.
CVE-2023-1084 affects all versions of GitLab before 15.7.8, between 15.8.0 and before 15.8.4, and between 15.9.0 and before 15.9.2.
A compromised Project Access Token allows full owner-level access, enabling malicious actions within the GitLab project.
The vulnerability can be exploited by a malicious project maintainer who leverages a crafted request to create a privileged access token.