First published: Fri Apr 12 2024(Updated: )
An issue has been discovered in GitLab EE affecting all versions before 16.8.6, all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. It was possible for an attacker to cause a denial of service using malicious crafted content in a junit test report file.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <16.8.6 | |
GitLab | >=16.9.0<16.9.4 | |
GitLab | >=16.10.0<16.10.2 |
Upgrade to versions 16.10.2, 16.9.4, 16.8.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6678 has been classified as a moderate severity vulnerability due to its potential to cause denial of service.
To remediate CVE-2023-6678, you should upgrade to GitLab EE version 16.8.6 or later, 16.9.4 or later, or 16.10.2 or later.
CVE-2023-6678 affects all GitLab EE versions before 16.8.6, and versions from 16.9 up to but not including 16.9.4, and from 16.10 up to but not including 16.10.2.
CVE-2023-6678 can be exploited through a denial of service attack using maliciously crafted content in a JUnit test.
CVE-2023-6678 specifically impacts GitLab EE installations and not the Community Edition.