First published: Wed May 03 2023(Updated: )
An issue has been discovered in GitLab EE affecting all versions starting from 14.2 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Lack of verification on RelayState parameter allowed a maliciously crafted URL to obtain access tokens granted for 3rd party Group SAML SSO logins. This feature isn't enabled by default.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.2<15.9.6 | |
GitLab | >=15.10<15.10.5 | |
GitLab | >=15.11<15.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1965 is considered a critical vulnerability due to its impact on access tokens.
To fix CVE-2023-1965, upgrade GitLab to version 15.9.6 or later, 15.10.5 or later, or 15.11.1 or later.
CVE-2023-1965 affects all versions of GitLab EE from 14.2 before 15.9.6, from 15.10 before 15.10.5, and from 15.11 before 15.11.1.
Yes, CVE-2023-1965 can be exploited remotely through maliciously crafted URLs.
CVE-2023-1965 involves a lack of verification on the RelayState parameter in GitLab EE.