First published: Sat Sep 30 2023(Updated: )
A vulnerability was discovered in GitLab CE and EE affecting all versions starting 16.0 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. An authenticated attacker could perform arbitrary pipeline execution under the context of another user.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=16.0.0<16.2.8 | |
GitLab GitLab | >=16.0.0<16.2.8 | |
GitLab GitLab | >=16.3.0<16.3.5 | |
GitLab GitLab | >=16.3.0<16.3.5 | |
GitLab GitLab | =16.4.0 | |
GitLab GitLab | =16.4.0 |
Upgrade to versions 16.4.1, 16.3.5, 16.2.8 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this GitLab vulnerability is CVE-2023-5207.
The severity of CVE-2023-5207 is high with a CVSS score of 8.2.
All versions of GitLab starting from 16.0 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 are affected by CVE-2023-5207.
An authenticated attacker can perform arbitrary pipeline execution under the context of another user with CVE-2023-5207.
You can find more information about CVE-2023-5207 vulnerability at the following references: [Reference 1](https://gitlab.com/gitlab-org/gitlab/-/issues/425604), [Reference 2](https://gitlab.com/gitlab-org/gitlab/-/issues/425857), [Reference 3](https://hackerone.com/reports/2174141).