First published: Fri May 26 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | =16.0.0 | |
GitLab GitLab | =16.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-2825.
The severity of CVE-2023-2825 is high with a severity value of 7.
Only GitLab CE/EE version 16.0.0 is affected by CVE-2023-2825.
An unauthenticated malicious user can exploit CVE-2023-2825 by using a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
Yes, you can find references for CVE-2023-2825 at the following links: [HackerOne Report](https://hackerone.com/reports/1994725), [GitLab Issue](https://gitlab.com/gitlab-org/gitlab/-/issues/412371), [GitLab CVE Repository](https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2825.json).