First published: Sun Dec 17 2023(Updated: )
A privilege escalation vulnerability in GitLab EE affecting all versions from 16.0 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2 allows a project Maintainer to use a Project Access Token to escalate their role to Owner
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.0.0<16.4.4 | |
GitLab | >=16.5<16.5.4 | |
GitLab | >=16.6<16.6.2 |
Upgrade to version 16.4.4, 16.5.4 or 16.6.2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3907 has been rated as a high severity vulnerability due to its potential for privilege escalation.
To mitigate CVE-2023-3907, update GitLab EE to version 16.4.4 or later, 16.5.4 or later, or 16.6.2 or later.
CVE-2023-3907 affects GitLab EE versions from 16.0 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2.
CVE-2023-3907 allows project Maintainers in GitLab to escalate their roles to Owner, impacting project security and access controls.
After identifying CVE-2023-3907, prioritize updating to a fixed version and review project access tokens and permissions.