Email Password Reset Vulnerability Affects GitLab Versions
CVE-2023-7028
Key Information
- Vendor
- Gitlab
- Status
- Gitlab
- Vendor
- CVE Published:
- 12 January 2024
Badges
What is CVE-2023-7028?
CVE-2023-7028 is a vulnerability identified in GitLab, a popular platform used for software development and version control. The issue affects multiple versions of GitLab Community Edition and Enterprise Edition, which are utilized by organizations for managing code repositories and facilitating collaboration among developers. This vulnerability permits user account password reset emails to be sent to unverified email addresses, potentially enabling unauthorized access to accounts. Such unauthorized access could have severe implications for an organizationās security posture, leading to data breaches or compromise of sensitive projects.
Technical Details
The vulnerability impacts GitLab versions ranging from 16.1 to 16.7, specifically those prior to updates 16.1.6, 16.2.9, 16.3.7, 16.4.5, 16.5.6, 16.6.4, and 16.7.2. It arises from the failure of the system to properly validate email addresses used in the password reset process. As a result, an attacker can manipulate this process, directing reset emails to any email address of their choice, regardless of verification status. This flaw may allow attackers to hijack user accounts if they gain access to the email account receiving the reset link.
Impact of the Vulnerability
-
Unauthorized Account Access: Attackers can exploit the vulnerability to gain unauthorized access to user accounts, posing a significant risk to sensitive information and project integrity.
-
Data Breach Potential: Once an account is compromised, attackers could access confidential data, intellectual property, and sensitive project details, leading to potential data breaches that could have legal and reputational repercussions for the organization.
-
Increased Risk of Further Exploitation: With access to compromised accounts, attackers may initiate further attacks, including deployment of malware, unauthorized changes to code repositories, or lateral movements within the organizationās systems, thereby amplifying the overall security threat.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2023-7028 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
GitLab < 16.1.6
GitLab < 16.2.9
GitLab < 16.3.7
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
GitLab: Critical bug lets attackers run pipelines as other users
GitLab warned today that a critical vulnerability in its product's GitLab Community and Enterprise editions allows attackers to run pipeline jobs as any other user.
5 months ago
CISA: Immediate GitLab account takeover flaw remediation crucial amid attacks
Ongoing intrusions targeting GitLab instances impacted by the maximum severity account takeover vulnerability, tracked as CVE-2023-7028, have prompted the flaw's inclusion in the Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog, with federal agencies urged t...
6 months ago
High-severity GitLab flaw lets attackers take over accounts
GitLab patched a high-severity vulnerability that unauthenticatedĀ attackers could exploit to take over user accounts in cross-site scripting (XSS) attacks.
7 months ago
Refferences
EPSS Score
91% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- š“
Public PoC available
CISA Reported
- š¾
Exploit known to exist
Vulnerability started trending
Vulnerability published
Vulnerability Reserved
First article discovered by Help Net Security
- š„
Vulnerability reached the number 1 worldwide trending spot