First published: Fri Jan 12 2024(Updated: )
A missing authorization check vulnerability exists in GitLab Remote Development affecting all versions prior to 16.5.6, 16.6 prior to 16.6.4 and 16.7 prior to 16.7.2. This condition allows an attacker to create a workspace in one group that is associated with an agent from another group.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <16.5.6 | |
GitLab | <16.5.6 | |
GitLab | >=16.6.0<16.6.4 | |
GitLab | >=16.6.0<16.6.4 | |
GitLab | =16.7.0 | |
GitLab | =16.7.0 | |
GitLab | =16.7.1 | |
GitLab | =16.7.1 |
Upgrade to versions 16.7.2, 16.6.4, 16.5.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6955 is considered a significant vulnerability due to the missing authorization check allowing unauthorized workspace creation.
To fix CVE-2023-6955, upgrade to GitLab version 16.5.6, 16.6.4 or 16.7.2 or later.
CVE-2023-6955 affects all versions prior to 16.5.6, 16.6 before 16.6.4, and 16.7 before 16.7.2 of GitLab.
CVE-2023-6955 allows an attacker to create a workspace in one group that is improperly associated with an agent from another group.
There is no specific workaround for CVE-2023-6955 other than applying the necessary software updates as soon as possible.