cvelist/2023/4xxx/CVE-2023-4895.json

110 lines
3.8 KiB
JSON
Raw Normal View History

2023-09-11 16:00:36 +00:00
{
2024-02-22 01:00:39 +00:00
"data_version": "4.0",
2023-09-11 16:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-4895",
2024-02-22 01:00:39 +00:00
"ASSIGNER": "cve@gitlab.com",
"STATE": "PUBLIC"
2023-09-11 16:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-02-22 01:00:39 +00:00
"value": "An issue has been discovered in GitLab EE affecting all versions starting from 12.0 to 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. This vulnerability allows for bypassing the 'group ip restriction' settings to access environment details of projects"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2024-10-03 07:00:37 +00:00
"value": "CWE-862: Missing Authorization",
"cweId": "CWE-862"
2024-02-22 01:00:39 +00:00
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GitLab",
"product": {
"product_data": [
{
"product_name": "GitLab",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "12.0",
"version_value": "16.7.6"
},
{
"version_affected": "<",
"version_name": "16.8",
"version_value": "16.8.3"
},
{
"version_affected": "<",
"version_name": "16.9",
"version_value": "16.9.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/424766",
"refsource": "MISC",
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/424766"
},
{
"url": "https://hackerone.com/reports/2134787",
"refsource": "MISC",
"name": "https://hackerone.com/reports/2134787"
}
]
},
"solution": [
{
"lang": "en",
"value": "Upgrade to versions 16.9.1, 16.8.3, 16.7.6 or above."
}
],
"credits": [
{
"lang": "en",
"value": "Thanks [albatraoz](https://hackerone.com/albatraoz) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
2024-10-03 07:00:37 +00:00
"attackVector": "NETWORK",
2024-02-22 01:00:39 +00:00
"availabilityImpact": "NONE",
"baseScore": 4.3,
2024-10-03 07:00:37 +00:00
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
2023-09-11 16:00:36 +00:00
}
]
}
}