First published: Fri Dec 15 2023(Updated: )
An improper certificate validation issue in Smartcard authentication in GitLab EE affecting all versions from 11.6 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2 allows an attacker to authenticate as another user given their public key if they use Smartcard authentication. Smartcard authentication is an experimental feature and has to be manually enabled by an administrator.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.6<16.4.4 | |
GitLab | >=16.5<16.5.4 | |
GitLab | >=16.6<16.6.2 |
Upgrade to versions 16.4.4, 16.5.4, 16.6.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-6680 is high due to the potential for an attacker to authenticate as another user.
To fix CVE-2023-6680, upgrade GitLab EE to versions 16.4.4, 16.5.4, or 16.6.2 or later.
CVE-2023-6680 affects all versions of GitLab EE from 11.6 to prior versions of 16.4.4, 16.5 to prior versions of 16.5.4, and 16.6 to prior versions of 16.6.2.
CVE-2023-6680 is an improper certificate validation issue specifically affecting Smartcard authentication.
An attacker can authenticate as another user using their public key if they exploit the vulnerability in Smartcard authentication.