QID 379588

QID 379588: Gitlab Multiple Vulnerabilities (prior to gitlab- 16.6.1, 16.5.3, 16.4.3)

GitLab Inc. is an open-core company that operates GitLab, a DevOps software package which can develop, secure, and operate software

CVE-2023-3401: External user can abuse policy bot to gain access to internal projects
CVE-2023-6033: Members with admin_group_member custom permission can add members with higher role
CVE-2023-6396: Release Description visible in public projects despite release set as project members only through atom response
CVE-2023-3949: Manipulate the repository content in the UI (CVE-2023-3401 bypass)
CVE-2023-5226: Developers can update pipeline schedules to use protected branches even if they don't have permission to merge
CVE-2023-5995: Users can install Composer packages from public projects even when Package registry is turned off
CVE-2023-4912: Client-side DOS via Mermaid Flowchart
CVE-2023-4317: Unauthorized member can gain Allowed to push and merge access and affect integrity of protected branches
CVE-2023-3964: Guest users can react (emojis) on confidential work items which they cant see in a project

Affected Versions:
16.6.0, 16.5.0, 16.5.1, 16.5.2, 16.4.0, 16.4.1, 16.4.2, and below

QID Detection Logic (Authenticated):(Linux)
The QID checks the contents of /opt/gitlab/version-manifest.txt to check the vulnerable version of GitLab.

Successful exploitation of the vulnerability may lead to External user can abuse policy bot to gain access to internal projects, Members with admin_group_member custom permission can add members with higher role, Release Description visible in public projects despite release set as project members only through atom response, Manipulate the repository content in the UI (CVE-2023-3401 bypass), Developers can update pipeline schedules to use protected branches even if they don't have permission to merge, Users can install Composer packages from public projects even when Package registry is turned off, Client-side DOS via Mermaid Flowchart, Unauthorized member can gain Allowed to push and merge access and affect integrity of protected branches, Guest users can react (emojis) on confidential work items which they cant see in a project

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    GitLab has released patch addressing the vulnerability. For more information please refer to GitLab Security Release: 16.6.1, 16.5.3, 16.4.3
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    GitLab Security Release: 16.6.1, 16.5.3, 16.4.3 URL Logo about.gitlab.com/releases/2023/11/30/security-release-gitlab-16-6-1-released/