cvelist/2023/7xxx/CVE-2023-7028.json
2024-09-18 05:00:36 +00:00

130 lines
5.1 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-7028",
"ASSIGNER": "cve@gitlab.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-640: Weak Password Recovery Mechanism for Forgotten Password",
"cweId": "CWE-640"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GitLab",
"product": {
"product_data": [
{
"product_name": "GitLab",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "16.1",
"version_value": "16.1.6"
},
{
"version_affected": "<",
"version_name": "16.2",
"version_value": "16.2.9"
},
{
"version_affected": "<",
"version_name": "16.3",
"version_value": "16.3.7"
},
{
"version_affected": "<",
"version_name": "16.4",
"version_value": "16.4.5"
},
{
"version_affected": "<",
"version_name": "16.5",
"version_value": "16.5.6"
},
{
"version_affected": "<",
"version_name": "16.6",
"version_value": "16.6.4"
},
{
"version_affected": "<",
"version_name": "16.7",
"version_value": "16.7.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/436084",
"refsource": "MISC",
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/436084"
},
{
"url": "https://hackerone.com/reports/2293343",
"refsource": "MISC",
"name": "https://hackerone.com/reports/2293343"
}
]
},
"solution": [
{
"lang": "en",
"value": "Upgrade to versions 16.7.2, 16.6.4, 16.5.6, 16.4.5, 16.3.7, 16.2.9, 16.1.6 or above."
}
],
"credits": [
{
"lang": "en",
"value": "Thanks [asterion04](https://hackerone.com/asterion04) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 10,
"baseSeverity": "CRITICAL"
}
]
}
}