跳转到帖子

Gitlab: CVE-2023-5009: Attacker can abuse scan execution policies to run pipelines as another user

recommended_posts

发布于
  • Members

Gitlab: CVE-2023-5009: Attacker can abuse scan execution policies to run pipelines as another user

Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
09/18/2023
Created
09/25/2023
Added
09/25/2023
Modified
09/26/2023

Description

From version 13.12 to 16.2.7 and from 16.3 to 16.3.4 in GitLab CE/EE it is possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. Instances running these versions are only vulnerable if direct transfers and security policies are both enabled. This is a bypass of CVE-2023-3932.

Solution(s)

  • gitlab-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2023-5009
  • CVE - 2023-5009
  • https://about.gitlab.com/releases/2023/09/18/security-release-gitlab-16-3-4-released/
  • 查看数 702
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…