First published: Mon Nov 06 2023(Updated: )
An authorization issue affecting GitLab EE affecting all versions from 14.7 prior to 16.3.6, 16.4 prior to 16.4.2, and 16.5 prior to 16.5.1, allowed a user to run jobs in protected environments, bypassing any required approvals.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.7.0<16.3.6 | |
GitLab | >=16.4.0<16.4.2 | |
GitLab | =16.5.0 |
Upgrade to versions 16.3.6, 16.4.2, 16.5.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2023-4700.
The title of this vulnerability is 'Improper Access Control in GitLab'.
This vulnerability is an authorization issue in GitLab EE versions 14.7 prior to 16.3.6, 16.4 prior to 16.4.2, and 16.5 prior to 16.5.1, which allows a user to run jobs in protected environments bypassing required approvals.
This vulnerability affects GitLab EE versions 14.7 prior to 16.3.6, 16.4 prior to 16.4.2, and 16.5 prior to 16.5.1.
The severity of CVE-2023-4700 is rated as medium with a CVSS score of 6.5.
The CWE ID associated with this vulnerability is CWE-284.
More information about this vulnerability can be found at the following references: [GitLab Issue](https://gitlab.com/gitlab-org/gitlab/-/issues/421937) and [HackerOne Report](https://hackerone.com/reports/2129826).