cvelist/2023/5xxx/CVE-2023-5512.json

110 lines
3.9 KiB
JSON
Raw Normal View History

2023-10-11 01:00:38 +00:00
{
2023-12-15 17:00:33 +00:00
"data_version": "4.0",
2023-10-11 01:00:38 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-5512",
2023-12-15 17:00:33 +00:00
"ASSIGNER": "cve@gitlab.com",
"STATE": "PUBLIC"
2023-10-11 01:00:38 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-12-15 17:00:33 +00:00
"value": "An issue has been discovered in GitLab CE/EE affecting all versions from 16.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when specific HTML encoding is used for file names leading for incorrect representation in the UI."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-94: Improper Control of Generation of Code ('Code Injection')",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GitLab",
"product": {
"product_data": [
{
"product_name": "GitLab",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "16.3",
"version_value": "16.4.4"
},
{
"version_affected": "<",
"version_name": "16.5",
"version_value": "16.5.4"
},
{
"version_affected": "<",
"version_name": "16.6",
"version_value": "16.6.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/427827",
"refsource": "MISC",
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/427827"
},
{
"url": "https://hackerone.com/reports/2194607",
"refsource": "MISC",
"name": "https://hackerone.com/reports/2194607"
}
]
},
"solution": [
{
"lang": "en",
"value": "Upgrade to versions 16.6.2, 16.5.4, 16.4.4 or above."
}
],
"credits": [
{
"lang": "en",
"value": "Thanks [st4nly0n](https://hackerone.com/st4nly0n) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
2023-10-11 01:00:38 +00:00
}
]
}
}