First published: Wed Jun 07 2023(Updated: )
An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An attacker can clone a repository from a public project, from a disallowed IP, even after the top-level group has enabled IP restrictions on the group.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.0.0<15.10.8 | |
GitLab | >=12.0.0<15.10.8 | |
GitLab | >=15.11.0<15.11.7 | |
GitLab | >=15.11.0<15.11.7 | |
GitLab | >=16.0.0<16.0.2 | |
GitLab | >=16.0.0<16.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2589 has been rated with high severity due to the potential for unauthorized access to GitLab repositories.
To remediate CVE-2023-2589, you should upgrade to GitLab version 15.10.8, 15.11.7, or 16.0.2 or later.
CVE-2023-2589 affects all GitLab versions starting from 12.0 before 15.10.8, 15.11 before 15.11.7, and 16.0 before 16.0.2.
An attacker can clone a repository from a public project from a disallowed IP address due to CVE-2023-2589.
Yes, the GitLab community version is impacted by CVE-2023-2589 if it is within the affected version range.