First published: Fri Dec 15 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 9.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. In certain situations, it may have been possible for developers to override predefined CI variables via the REST API.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=9.3.0<16.4.4 | |
GitLab | >=9.3.0<16.4.4 | |
GitLab | >=16.5.0<16.5.4 | |
GitLab | >=16.5.0<16.5.4 |
Upgrade to versions 16.4.4, 16.5.4, 16.6.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5061 has been classified with a medium severity rating due to its potential impact on GitLab CI variable settings.
To mitigate CVE-2023-5061, upgrade GitLab to version 16.4.4 or later, or to versions 16.5.4 or later, or 16.6.2 or later.
CVE-2023-5061 affects all GitLab versions from 9.3 to prior to 16.4.4, 16.5 to prior to 16.5.4, and 16.6 to prior to 16.6.2.
CVE-2023-5061 may allow developers to override predefined CI variables, which could lead to unwanted changes in CI/CD pipelines.
Currently, there are no documented workarounds for CVE-2023-5061, so it is recommended to update GitLab as soon as possible.