First published: Wed Jun 07 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 1.2 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An issue was found that allows someone to abuse a discrepancy between the Web application display and the git command line interface to social engineer victims into cloning non-trusted code.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=1.2.0<15.10.8 | |
GitLab | >=1.2.0<15.10.8 | |
GitLab | >=15.11.0<15.11.7 | |
GitLab | >=15.11.0<15.11.7 | |
GitLab | >=16.0.0<16.0.2 | |
GitLab | >=16.0.0<16.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2013 has been classified with a moderate severity level due to its potential impact on the confidentiality of information.
To remediate CVE-2023-2013, users should update their GitLab installation to a version after 15.10.8, 15.11.7, or 16.0.2.
CVE-2023-2013 affects all GitLab CE/EE versions from 1.2 before 15.10.8, from 15.11 before 15.11.7, and from 16.0 before 16.0.2.
CVE-2023-2013 is a vulnerability that allows an attacker to exploit a discrepancy between the web application display and its underlying functionality.
There are no recommended workarounds for CVE-2023-2013; the best action is to upgrade to the patched versions of GitLab.