Lucene search

K
cvelistGitLabCVELIST:CVE-2023-0756
HistoryMay 03, 2023 - 12:00 a.m.

CVE-2023-0756

2023-05-0300:00:00
GitLab
www.cve.org
gitlab
vulnerability
malicious code
arbitrary code execution

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N

8.1 High

AI Score

Confidence

High

0.018 Low

EPSS

Percentile

88.2%

An issue has been discovered in GitLab affecting all versions before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. The main branch of a repository with a specially crafted name allows an attacker to create repositories with malicious code, victims who clone or download these repositories will execute arbitrary code on their systems.

CNA Affected

[
  {
    "vendor": "GitLab",
    "product": "GitLab",
    "versions": [
      {
        "version": "<15.9.6",
        "status": "affected"
      },
      {
        "version": ">=15.10, <15.10.5",
        "status": "affected"
      },
      {
        "version": ">=15.11, <15.11.1",
        "status": "affected"
      }
    ]
  }
]

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N

8.1 High

AI Score

Confidence

High

0.018 Low

EPSS

Percentile

88.2%