First published: Fri Dec 15 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions from 16.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when specific HTML encoding is used for file names leading for incorrect representation in the UI.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.3.0<16.4.4 | |
GitLab | >=16.3.0<16.4.4 | |
GitLab | >=16.5.0<16.5.4 | |
GitLab | >=16.5.0<16.5.4 |
Upgrade to versions 16.6.2, 16.5.4, 16.4.4 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5512 is considered a significant vulnerability that may lead to file integrity compromise in affected versions of GitLab.
To fix CVE-2023-5512, upgrade GitLab to version 16.4.4 or later, or to version 16.5.4 or later, or to version 16.6.2 or later.
CVEs affecting this vulnerability include all versions of GitLab from 16.3.0 to 16.4.4, 16.5.0 to 16.5.4, and 16.6.0 to 16.6.2.
Exploitation of CVE-2023-5512 may lead to compromised file integrity, potentially allowing unauthorized users to manipulate file systems.
Yes, CVE-2023-5512 is specifically related to vulnerabilities arising from improper HTML encoding used in file names.