First published: Fri Sep 29 2023(Updated: )
An issue has been discovered in GitLab affecting all versions prior to 16.2.7, all versions starting from 16.3 before 16.3.5, and all versions starting from 16.4 before 16.4.1. It was possible for a removed project member to write to protected branches using deploy keys.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=8.15<16.2.8 | |
GitLab GitLab | >=8.15<16.2.8 | |
GitLab GitLab | >=16.3.0<16.3.5 | |
GitLab GitLab | >=16.3.0<16.3.5 | |
GitLab GitLab | =16.4.0 | |
GitLab GitLab | =16.4.0 | |
>=8.15<16.2.8 | ||
>=8.15<16.2.8 | ||
>=16.3.0<16.3.5 | ||
>=16.3.0<16.3.5 | ||
=16.4.0 | ||
=16.4.0 |
Upgrade to versions 16.4.1, 16.3.5, 16.2.8 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this GitLab issue is CVE-2023-5198.
This vulnerability affects all versions prior to 16.2.7, all versions starting from 16.3 before 16.3.5, and all versions starting from 16.4 before 16.4.1 of GitLab.
A removed project member can exploit this vulnerability by writing to protected branches using deploy keys.
The severity of CVE-2023-5198 is medium.
To fix this vulnerability, you should update GitLab to version 16.2.7 or later for versions prior to 16.3.5, and update to version 16.3.5 or later for versions starting from 16.3 before 16.4.1.