cvelist/2023/5xxx/CVE-2023-5612.json

115 lines
4.1 KiB
JSON
Raw Normal View History

2023-10-17 12:00:37 +00:00
{
2024-01-26 03:00:36 +00:00
"data_version": "4.0",
2023-10-17 12:00:37 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-5612",
2024-01-26 03:00:36 +00:00
"ASSIGNER": "cve@gitlab.com",
"STATE": "PUBLIC"
2023-10-17 12:00:37 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-26 03:00:36 +00:00
"value": "An issue has been discovered in GitLab affecting all versions before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. It was possible to read the user email address via tags feed although the visibility in the user profile has been disabled."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
"cweId": "CWE-200"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GitLab",
"product": {
"product_data": [
{
"product_name": "GitLab",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "16.6.6"
},
{
"version_affected": "<",
"version_name": "16.7",
"version_value": "16.7.4"
},
{
"version_affected": "<",
"version_name": "16.8",
"version_value": "16.8.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/",
"refsource": "MISC",
"name": "https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/"
},
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/428441",
"refsource": "MISC",
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/428441"
},
{
"url": "https://hackerone.com/reports/2208790",
"refsource": "MISC",
"name": "https://hackerone.com/reports/2208790"
}
]
},
"solution": [
{
"lang": "en",
"value": "Upgrade to versions 16.8.1, 16.7.4, 16.6.6 or above."
}
],
"credits": [
{
"lang": "en",
"value": "Thanks [erruqill](https://hackerone.com/erruqill) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
2023-10-17 12:00:37 +00:00
}
]
}
}