Security Scan Bypass Vulnerability Affects GitLab EE Versions
CVE-2023-5009
Key Information:
Badges
Summary
A vulnerability has been identified in GitLab EE that allows attackers to execute pipeline jobs as an arbitrary user through scheduled security scan policies. This issue affects multiple versions of GitLab EE, enabling unauthorized actions that exploit a bypass related to previous vulnerabilities. This incident highlights the importance of monitoring security protocols and updating systems promptly to mitigate potential threats.
Affected Version(s)
GitLab 13.12 < 16.2.7
GitLab 16.3 < 16.3.4
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting ๐
Well keep you posted ๐ง
News Articles
GitLab addressed critical vulnerability CVE-2023-5009
GitLab rolled out security patches to address a critical flaw (CVE-2023-5009) that can be exploited to run pipelines as another user.
References
CVSS V3.1
Timeline
- ๐ฐ
First article discovered by Security Affairs
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved