First published: Fri Jan 26 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions after 13.7 before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. Improper input sanitization of user name allows arbitrary API PUT requests.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.7.0<16.6.6 | |
GitLab | >=13.7.0<16.6.6 | |
GitLab | >=16.7.0<16.7.4 | |
GitLab | >=16.7.0<16.7.4 | |
GitLab | =16.8.0 | |
GitLab | =16.8.0 |
Upgrade to versions 16.8.1, 16.7.4, 16.6.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5933 is classified as critical due to improper input sanitization that allows arbitrary API PUT requests.
To fix CVE-2023-5933, update GitLab to versions 16.6.6, 16.7.4, or 16.8.1 or later.
CVE-2023-5933 affects GitLab CE/EE versions 13.7 to 16.6.6, 16.7 to 16.7.4, and 16.8 to 16.8.0.
CVE-2023-5933 is an input validation vulnerability that can lead to improper handling of API requests.
Currently, the recommended solution for CVE-2023-5933 is to apply the latest updates to GitLab, as there are no specific workaround techniques.