Lucene search

K
cve[email protected]CVE-2023-5933
HistoryJan 26, 2024 - 1:15 a.m.

CVE-2023-5933

2024-01-2601:15:08
CWE-80
CWE-79
web.nvd.nist.gov
23
cve-2023-5933
gitlab
ce
ee
input sanitization
api
security vulnerability

6.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N

5.5 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.1%

An issue has been discovered in GitLab CE/EE affecting all versions after 13.7 before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. Improper input sanitization of user name allows arbitrary API PUT requests.

Affected configurations

NVD
Node
gitlabgitlabRange13.7.016.6.6community
OR
gitlabgitlabRange13.7.016.6.6enterprise
OR
gitlabgitlabRange16.7.016.7.4community
OR
gitlabgitlabRange16.7.016.7.4enterprise
OR
gitlabgitlabMatch16.8.0community
OR
gitlabgitlabMatch16.8.0enterprise

CNA Affected

[
  {
    "vendor": "GitLab",
    "product": "GitLab",
    "repo": "git://[email protected]:gitlab-org/gitlab.git",
    "versions": [
      {
        "version": "13.7",
        "status": "affected",
        "lessThan": "16.6.6",
        "versionType": "semver"
      },
      {
        "version": "16.7",
        "status": "affected",
        "lessThan": "16.7.4",
        "versionType": "semver"
      },
      {
        "version": "16.8",
        "status": "affected",
        "lessThan": "16.8.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

6.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N

5.5 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.1%