First published: Thu May 23 2024(Updated: )
A CSRF vulnerability exists within GitLab CE/EE from versions 13.11 before 16.10.6, from 16.11 before 16.11.3, from 17.0 before 17.0.1. By leveraging this vulnerability, an attacker could exfiltrate anti-CSRF tokens via the Kubernetes Agent Server (KAS).
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.11.0<16.10.6 | |
GitLab | >=13.11.0<16.10.6 | |
GitLab | >=16.11.0<16.11.3 | |
GitLab | >=16.11.0<16.11.3 | |
GitLab | =17.0.0 | |
GitLab | =17.0.0 |
Upgrade to versions 16.10.6, 16.11.3, 17.0.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7045 has a high severity rating due to its potential to allow attackers to exfiltrate anti-CSRF tokens.
To remediate CVE-2023-7045, upgrade GitLab CE/EE to version 16.10.6 or later, 16.11.3 or later, or 17.0.1.
CVE-2023-7045 affects GitLab CE/EE versions from 13.11 before 16.10.6, from 16.11 before 16.11.3, and from 17.0 before 17.0.1.
Yes, exploiting CVE-2023-7045 can enable attackers to take over user accounts by exfiltrating crucial tokens.
CVE-2023-7045 is classified as a Cross-Site Request Forgery (CSRF) vulnerability.