First published: Thu Jul 13 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.1 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, all versions from 16.1 prior to 16.1.1. A maintainer could modify a webhook URL to leak masked webhook secrets by manipulating other masked portions. This addresses an incomplete fix for CVE-2023-0838.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=15.1.0<15.11.10 | |
GitLab GitLab | >=15.1.0<15.11.10 | |
GitLab GitLab | >=16.0.0<16.0.6 | |
GitLab GitLab | >=16.0.0<16.0.6 | |
GitLab GitLab | >=16.1.0<16.1.1 | |
GitLab GitLab | >=16.1.0<16.1.1 |
Upgrade to versions 15.11.10, 16.0.6, 16.1.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2620 is an issue discovered in GitLab CE/EE affecting all versions starting from 15.1 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, all versions from 16.1 prior to 16.1.1. A maintainer could modify a webhook URL to leak masked webhook secrets by manipulating other masked portions.
The severity of CVE-2023-2620 is medium with a severity value of 3.8.
CVE-2023-2620 allows a maintainer to modify a webhook URL to leak masked webhook secrets.
The affected software versions of GitLab CE/EE are all versions starting from 15.1 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, and all versions from 16.1 prior to 16.1.1.
To fix the vulnerability in GitLab CE/EE, it is recommended to update to versions 15.11.10, 16.0.6, or 16.1.1 or later.