Lucene search

K
cvelistGitLabCVELIST:CVE-2023-1965
HistoryMay 03, 2023 - 12:00 a.m.

CVE-2023-1965

2023-05-0300:00:00
GitLab
www.cve.org
gitlab saml access

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

6.7 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.5%

An issue has been discovered in GitLab EE affecting all versions starting from 14.2 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Lack of verification on RelayState parameter allowed a maliciously crafted URL to obtain access tokens granted for 3rd party Group SAML SSO logins. This feature isn’t enabled by default.

CNA Affected

[
  {
    "vendor": "GitLab",
    "product": "GitLab",
    "versions": [
      {
        "version": ">=14.2, <15.9.6",
        "status": "affected"
      },
      {
        "version": ">=15.10, <15.10.5",
        "status": "affected"
      },
      {
        "version": ">=15.11, <15.11.1",
        "status": "affected"
      }
    ]
  }
]

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

6.7 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.5%

Related for CVELIST:CVE-2023-1965