First published: Mon Nov 06 2023(Updated: )
An issue has been discovered in GitLab EE affecting all versions starting from 11.6 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. It was possible for an unauthorised project or group member to read the CI/CD variables using the custom project templates.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=11.6.0<12.9.8 | |
GitLab GitLab | >=11.6.0<12.9.8 | |
GitLab GitLab | >=12.10.0<12.10.7 | |
GitLab GitLab | >=12.10.0<12.10.7 | |
GitLab GitLab | =13.0.0 | |
GitLab GitLab | =13.0.0 |
Upgrade to versions 16.5.1, 16.4.2, 16.3.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3399 is a vulnerability in GitLab that allows unauthorized users to read CI/CD variables.
GitLab versions starting from 11.6 before 16.3.6, 16.4 before 16.4.2, and 16.5 before 16.5.1 are affected by CVE-2023-3399.
An unauthorized user can exploit CVE-2023-3399 by accessing the CI/CD variables using the custom project or group member capabilities.
CVE-2023-3399 has a severity rating of high (8.5).
Yes, you can find more information about CVE-2023-3399 at the following references: [GitLab Issue](https://gitlab.com/gitlab-org/gitlab/-/issues/416244) and [HackerOne Report](https://hackerone.com/reports/2021616).