First published: Mon Nov 06 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, and all versions starting from 16.5.0 before 16.5.1 which have the `super_sidebar_logged_out` feature flag enabled. Affected versions with this default-disabled feature flag enabled may unintentionally disclose GitLab version metadata to unauthorized actors.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.0.0<16.3.6 | |
GitLab | >=16.0.0<16.3.6 | |
GitLab | >=16.4.0<16.4.2 | |
GitLab | >=16.4.0<16.4.2 | |
GitLab | =16.5.0 | |
GitLab | =16.5.0 |
Upgrade to version 16.3.6, 16.4.1, 16.5.1. Risk can also be mitigated by disabling the default-disabled `super_sidebar_logged_out` feature flag if it was previously enabled.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5831 is a vulnerability in GitLab CE/EE that allows unauthorized actors to access sensitive information.
GitLab versions starting from 16.0 before 16.3.6, starting from 16.4 before 16.4.2, and starting from 16.5.0 before 16.5.1 (with the `super_sidebar_logged_out` feature flag enabled) are affected by CVE-2023-5831.
CVE-2023-5831 has a severity rating of medium with a CVSS score of 5.3.
To fix CVE-2023-5831, it is recommended to upgrade GitLab to version 16.3.6, 16.4.2, or 16.5.1 or higher, and disable the `super_sidebar_logged_out` feature flag.
More information about CVE-2023-5831 can be found at the following reference link: [CVE-2023-5831](https://gitlab.com/gitlab-org/gitlab/-/issues/428919).