CVE-2023-5009

An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This was a bypass of [CVE-2023-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932) showing additional impact.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://gitlab.com/gitlab-org/gitlab/-/issues/425304 - Broken Link () https://gitlab.com/gitlab-org/gitlab/-/issues/425304 - Broken Link
References () https://hackerone.com/reports/2147126 - Permissions Required () https://hackerone.com/reports/2147126 - Permissions Required
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.2

03 Oct 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-19 08:16

Updated : 2024-11-21 08:40


NVD link : CVE-2023-5009

Mitre link : CVE-2023-5009

CVE.ORG link : CVE-2023-5009


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-863

Incorrect Authorization

NVD-CWE-Other