SB2024011214 - Multiple vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE)
Published: January 12, 2024 Updated: February 25, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2023-7028)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can deliver user account password reset emails to an unverified email address.
2) Improper Authorization (CVE-ID: CVE-2023-5356)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to incorrect authorization checks. A remote user can abuse Slack/Mattermost integrations to execute slash commands as another user.
3) Improper access control (CVE-ID: CVE-2023-6955)
The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in GitLab Remote Development. A remote administrator can create a workspace in one group that is associated with an agent from another group.
4) Input validation error (CVE-ID: CVE-2023-2030)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to commit signature validation ignores headers after signature. A remote user can modify the metadata of signed commits.
Remediation
Install update from vendor's website.