First published: Mon May 08 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.9.7, all versions starting from 15.10 before 15.10.6, all versions starting from 15.11 before 15.11.2. Under certain conditions, a malicious unauthorized GitLab user may use a GraphQL endpoint to attach a malicious runner to any project.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=15.4.0<15.9.7 | |
GitLab | >=15.4.0<15.9.7 | |
GitLab | >=15.10.0<15.10.6 | |
GitLab | >=15.10.0<15.10.6 | |
GitLab | >=15.11.0<15.11.2 | |
GitLab | >=15.11.0<15.11.2 | |
>=15.4.0<15.9.7 | ||
>=15.4.0<15.9.7 | ||
>=15.10.0<15.10.6 | ||
>=15.10.0<15.10.6 | ||
>=15.11.0<15.11.2 | ||
>=15.11.0<15.11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2478 is classified as a high severity vulnerability.
To fix CVE-2023-2478, upgrade GitLab to the latest version above 15.9.7, 15.10.6, or 15.11.2, depending on your current version.
CVE-2023-2478 affects all GitLab Community and Enterprise Edition versions from 15.4 up to 15.9.7, from 15.10 up to 15.10.6, and from 15.11 up to 15.11.2.
CVE-2023-2478 could allow a malicious unauthorized user to exploit a GraphQL endpoint under specific conditions.
You can determine your vulnerability to CVE-2023-2478 by checking if you are running a version of GitLab that falls within the affected version range.