mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
100 lines
3.5 KiB
JSON
100 lines
3.5 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-0483",
|
|
"ASSIGNER": "cve@gitlab.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "GitLab",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "GitLab",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": ">=12.1, <15.7.8"
|
|
},
|
|
{
|
|
"version_value": ">=15.8, <15.8.4"
|
|
},
|
|
{
|
|
"version_value": ">=15.9, <15.9.2"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Information exposure through an error message in GitLab"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/389188",
|
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/389188",
|
|
"refsource": "MISC"
|
|
},
|
|
{
|
|
"name": "https://hackerone.com/reports/1836466",
|
|
"url": "https://hackerone.com/reports/1836466",
|
|
"refsource": "MISC"
|
|
},
|
|
{
|
|
"name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0483.json",
|
|
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0483.json",
|
|
"refsource": "CONFIRM"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An issue has been discovered in GitLab affecting all versions starting from 12.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. It was possible for a project maintainer to extract a Datadog integration API key by modifying the site."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"vectorString": "AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "NONE",
|
|
"version": "3.1",
|
|
"baseScore": 5.4,
|
|
"baseSeverity": "MEDIUM"
|
|
}
|
|
},
|
|
"credit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Thanks [akadrian](https://hackerone.com/akadrian) for reporting this vulnerability through our HackerOne bug bounty program"
|
|
}
|
|
]
|
|
} |