First published: Wed May 03 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 10.0 before 12.9.8, all versions starting from 12.10 before 12.10.7, all versions starting from 13.0 before 13.0.1. A user could use an unverified email as a public email and commit email by sending a specifically crafted request on user update settings.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.0<12.9.8 | |
GitLab | >=12.10<12.10.7 | |
GitLab | >=13.0<13.0.1 | |
>=10.0<12.9.8 | ||
>=12.10<12.10.7 | ||
>=13.0<13.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1204 has a medium severity rating due to its potential impact on user information integrity.
To remediate CVE-2023-1204, you should upgrade GitLab to a version that is not affected, specifically versions 12.9.8, 12.10.7, or 13.0.1 or later.
CVE-2023-1204 affects all versions of GitLab starting from 10.0 to before 12.9.8, all versions starting from 12.10 to before 12.10.7, and all versions starting from 13.0 to before 13.0.1.
CVE-2023-1204 is a vulnerability related to unauthorized exposure of public email and commit email by leveraging unverified email accounts.
There are no specific workarounds for CVE-2023-1204; the best mitigation is to update to the latest patched version of GitLab.