cvelist/2023/3xxx/CVE-2023-3920.json

110 lines
3.8 KiB
JSON
Raw Normal View History

2023-07-25 11:00:33 +00:00
{
2023-09-29 07:00:35 +00:00
"data_version": "4.0",
2023-07-25 11:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-3920",
2023-09-29 07:00:35 +00:00
"ASSIGNER": "cve@gitlab.com",
"STATE": "PUBLIC"
2023-07-25 11:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-09-29 07:00:35 +00:00
"value": "An issue has been discovered in GitLab affecting all versions starting from 11.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that a maintainer to create a fork relationship between existing projects contrary to the documentation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2024-10-03 07:00:37 +00:00
"value": "CWE-863: Incorrect Authorization",
"cweId": "CWE-863"
2023-09-29 07:00:35 +00:00
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GitLab",
"product": {
"product_data": [
{
"product_name": "GitLab",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "11.2",
"version_value": "16.2.8"
},
{
"version_affected": "<",
"version_name": "16.3",
"version_value": "16.3.5"
},
{
"version_affected": "<",
"version_name": "16.4",
"version_value": "16.4.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/417481",
"refsource": "MISC",
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/417481"
},
{
"url": "https://hackerone.com/reports/2058121",
"refsource": "MISC",
"name": "https://hackerone.com/reports/2058121"
}
]
},
"solution": [
{
"lang": "en",
"value": "Upgrade to version 16.4.1, 16.3.5, 16.2.8"
}
],
"credits": [
{
"lang": "en",
"value": "Thanks [theluci](https://hackerone.com/theluci) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
2024-10-03 07:00:37 +00:00
"attackVector": "NETWORK",
2023-09-29 07:00:35 +00:00
"availabilityImpact": "NONE",
"baseScore": 4.3,
2024-10-03 07:00:37 +00:00
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
2023-07-25 11:00:33 +00:00
}
]
}
}