First published: Fri Jan 12 2024(Updated: )
An issue has been discovered in GitLab EE affecting all versions starting from 15.3 before 16.5.6, all versions starting from 16.6 before 16.6.4, all versions starting from 16.7 before 16.7.2. The required CODEOWNERS approval could be bypassed by adding changes to a previously approved merge request.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=15.3.0<16.5.5 | |
GitLab | >=15.3.0<16.5.5 | |
GitLab | >=16.6.0<16.6.4 | |
GitLab | >=16.6.0<16.6.4 | |
GitLab | =16.7.0 | |
GitLab | =16.7.1 |
Upgrade to versions 16.7.2, 16.6.4, 16.5.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4812 is considered a critical vulnerability that allows the bypassing of CODEOWNERS approval in GitLab.
To fix CVE-2023-4812, upgrade GitLab to version 16.6.4 or later, or to version 16.7.2 or later.
CVE-2023-4812 affects GitLab versions from 15.3 before 16.5.6, from 16.6 before 16.6.4, and from 16.7 before 16.7.2.
CVE-2023-4812 can lead to unauthorized changes in a project without proper CODEOWNERS approval, jeopardizing project integrity.
Yes, CVE-2023-4812 affects both GitLab Community and Enterprise editions across specified vulnerable versions.