CVE-2023-3907

A privilege escalation vulnerability in GitLab EE affecting all versions from 16.0 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2 allows a project Maintainer to use a Project Access Token to escalate their role to Owner
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

History

21 Dec 2023, 20:02

Type Values Removed Values Added
References () https://gitlab.com/gitlab-org/gitlab/-/issues/418878 - () https://gitlab.com/gitlab-org/gitlab/-/issues/418878 - Broken Link
References () https://hackerone.com/reports/2058934 - () https://hackerone.com/reports/2058934 - Permissions Required
First Time Gitlab
Gitlab gitlab
CVSS v2 : unknown
v3 : 4.9
v2 : unknown
v3 : 8.8
Summary
  • (es) Una vulnerabilidad de escalada de privilegios en GitLab EE que afecta a todas las versiones desde 16.0 anterior a 16.4.4, 16.5 anterior a 16.5.4 y 16.6 anterior a 16.6.2 permite que un mantenedor de proyecto use un token de acceso al proyecto para escalar su rol a propietario.
CPE cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

17 Dec 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-17 23:15

Updated : 2023-12-21 20:02


NVD link : CVE-2023-3907

Mitre link : CVE-2023-3907

CVE.ORG link : CVE-2023-3907


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-269

Improper Privilege Management