Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-4317
HistoryDec 01, 2023 - 7:15 a.m.

CVE-2023-4317

2023-12-0107:15:10
Debian Security Bug Tracker
security-tracker.debian.org
6
cve-2023-4317
gitlab
pipeline
schedule
update
vulnerability
user role
branch
unix

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

4.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.2%

An issue has been discovered in GitLab affecting all versions starting from 9.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for a user with the Developer role to update a pipeline schedule from an unprotected branch to a protected branch.

OSVersionArchitecturePackageVersionFilename
Debian999allgitlab< 16.4.4+ds2-2gitlab_16.4.4+ds2-2_all.deb

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

4.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.2%

Related for DEBIANCVE:CVE-2023-4317