First published: Fri Jan 12 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
Credit: 0xB455 cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=16.1.0<16.1.6 | |
GitLab GitLab | >=16.1.0<16.1.6 | |
GitLab GitLab | >=16.2.0<16.2.9 | |
GitLab GitLab | >=16.2.0<16.2.9 | |
GitLab GitLab | >=16.3.0<16.3.7 | |
GitLab GitLab | >=16.3.0<16.3.7 | |
GitLab GitLab | >=16.4.0<16.4.5 | |
GitLab GitLab | >=16.4.0<16.4.5 | |
GitLab GitLab | >=16.5.0<16.5.6 | |
GitLab GitLab | >=16.5.0<16.5.6 | |
GitLab GitLab | >=16.6.0<16.6.4 | |
GitLab GitLab | >=16.6.0<16.6.4 | |
GitLab GitLab | >=16.7.0<16.7.2 | |
GitLab GitLab | >=16.7.0<16.7.2 | |
Upgrade to versions 16.7.2, 16.6.4, 16.5.6, 16.4.5, 16.3.7, 16.2.9, 16.1.6 or above.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.