First published: Wed May 03 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 11.9 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. The condition allows for a privileged attacker, under certain conditions, to obtain session tokens from all users of a GitLab instance.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.9<15.9.6 | |
GitLab | >=15.10<15.10.5 | |
GitLab | >=15.11<15.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1265 has been classified as a medium severity vulnerability.
To fix CVE-2023-1265, upgrade GitLab to version 15.9.6, 15.10.5, or 15.11.1 or later.
CVE-2023-1265 may allow a privileged attacker to obtain session tokens under certain conditions.
CVE-2023-1265 affects GitLab versions starting from 11.9 before 15.9.6, 15.10 before 15.10.5, and 15.11 before 15.11.1.
CVE-2023-1265 is considered a local vulnerability as it requires a privileged attacker to exploit it.