First published: Mon Sep 11 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 10.6 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 in which any user can read limited information about any project's imports.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=10.6.0<16.1.5 | |
GitLab GitLab | >=10.6.0<16.1.5 | |
GitLab GitLab | >=16.2.0<16.2.5 | |
GitLab GitLab | >=16.2.0<16.2.5 | |
GitLab GitLab | =16.3.0 | |
GitLab GitLab | =16.3.0 | |
>=10.6.0<16.1.5 | ||
>=10.6.0<16.1.5 | ||
>=16.2.0<16.2.5 | ||
>=16.2.0<16.2.5 | ||
=16.3.0 | ||
=16.3.0 |
Upgrade to versions 16.1.5, 16.2.5, 16.3.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-4630.
The severity of CVE-2023-4630 is medium with a severity value of 4.3.
All versions starting from 10.6 to 16.1.5, all versions starting from 16.2 to 16.2.5, and version 16.3.0 are affected by CVE-2023-4630.
CVE-2023-4630 allows any user to read limited information about any project's imports in GitLab.
Yes, you can find references for CVE-2023-4630 at the following links: [Reference 1](https://about.gitlab.com/releases/2023/08/31/security-release-gitlab-16-3-1-released/) and [Reference 2](https://gitlab.com/gitlab-org/gitlab/-/issues/415117).