First published: Fri Jan 12 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
Credit: 0xB455 cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.1.0<16.1.6 | |
GitLab | >=16.1.0<16.1.6 | |
GitLab | >=16.2.0<16.2.9 | |
GitLab | >=16.2.0<16.2.9 | |
GitLab | >=16.3.0<16.3.7 | |
GitLab | >=16.3.0<16.3.7 | |
GitLab | >=16.4.0<16.4.5 | |
GitLab | >=16.4.0<16.4.5 | |
GitLab | >=16.5.0<16.5.6 | |
GitLab | >=16.5.0<16.5.6 | |
GitLab | >=16.6.0<16.6.4 | |
GitLab | >=16.6.0<16.6.4 | |
GitLab | >=16.7.0<16.7.2 | |
GitLab | >=16.7.0<16.7.2 | |
GitLab |
Upgrade to versions 16.7.2, 16.6.4, 16.5.6, 16.4.5, 16.3.7, 16.2.9, 16.1.6 or above.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-7028 is currently classified as critical due to the potential for account takeover through zero-click attacks.
To fix CVE-2023-7028, update GitLab to version 16.1.6, 16.2.9, 16.3.7, 16.4.5, 16.5.6, 16.6.4, or 16.7.2, or later.
CVE-2023-7028 affects all GitLab CE/EE versions from 16.1.0 to prior versions specified up to 16.7.2.
All users of GitLab CE/EE running affected versions prior to the fix are at risk of this vulnerability.
Yes, CVE-2023-7028 is reported to be actively exploited in the wild, increasing the urgency for users to apply updates.