First published: Wed Jul 26 2023(Updated: )
An issue has been discovered in GitLab DAST scanner affecting all versions starting from 3.0.29 before 4.0.5, in which the DAST scanner leak cross site cookies on redirect during authorization.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=3.0.29<4.0.5 |
Upgrade to versions 4.0.5 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-1401 is medium, with a severity value of 4.3.
All versions of GitLab starting from 3.0.29 before 4.0.5 are affected by CVE-2023-1401.
The issue in CVE-2023-1401 is that the GitLab DAST scanner leaks cross-site cookies on redirect during authorization.
You can find more information about CVE-2023-1401 at the following references: [HackerOne report](https://hackerone.com/reports/1889255) and [GitLab issue](https://gitlab.com/gitlab-org/gitlab/-/issues/396533).
To fix the vulnerability in CVE-2023-1401, update GitLab to version 4.0.5 or newer.