First published: Fri Dec 01 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 11.3 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for unauthorized users to view a public projects' release descriptions via an atom endpoint when release access on the public was set to only project members.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=11.3.0<16.4.3 | |
GitLab GitLab | >=11.3.0<16.4.3 | |
GitLab GitLab | >=16.5.0<16.5.3 | |
GitLab GitLab | >=16.5.0<16.5.3 | |
GitLab GitLab | =16.6.0 | |
GitLab GitLab | =16.6.0 |
Upgrade to version 16.4.3, 16.5.3 or 16.6.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identifier for this GitLab vulnerability is CVE-2023-3949.
This vulnerability affects GitLab versions starting from 11.3 before 16.4.3, starting from 16.5 before 16.5.3, and starting from 16.6 before 16.6.1.
The severity rating of CVE-2023-3949 is medium, with a CVSS score of 5.3.
Unauthorized users can view a public project's release descriptions in GitLab by accessing the atom endpoint.
You can find more information about this GitLab vulnerability at the following references: [link1](https://gitlab.com/gitlab-org/gitlab/-/issues/419664), [link2](https://hackerone.com/reports/2079374).