First published: Fri Dec 01 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 9.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for a user with the Developer role to update a pipeline schedule from an unprotected branch to a protected branch.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=9.2.0<16.4.3 | |
GitLab GitLab | >=9.2.0<16.4.3 | |
GitLab GitLab | >=16.5.0<16.5.3 | |
GitLab GitLab | >=16.5.0<16.5.3 | |
GitLab GitLab | =16.6.0 | |
GitLab GitLab | =16.6.0 |
Upgrade to versions 16.4.3, 16.5.3, 16.6.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4317 is a vulnerability in GitLab that allows users with the Developer role to update a pipeline schedule from an unprotected branch.
The vulnerability affects all versions of GitLab starting from 9.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, and version 16.6.0.
The vulnerability has a severity rating of 4.3 (Medium).
You can find more information about CVE-2023-4317 in the GitLab issue tracker and a HackerOne report.
To fix the vulnerability, you should update GitLab to version 16.4.3, 16.5.3, or 16.6.1 or later.