GitLab Product Security Update Advisory (CVE-2023-7028, CVE-2023-5356, CVE-2023-4812, CVE-2023-6955, CVE-2023-2030)
Overview
GitLab has released a security update to fix vulnerabilities in its products. Users of affected systems are advised to update to the latest version.
Affected Products
CVE-2023-7028
- GitLab CE/EE 16.1: All versions before 16.1.6
- GitLab CE/EE 16.2: All versions before 16.2.9
- GitLab CE/EE 16.3: All versions before 16.3.7
- GitLab CE/EE 16.4: All versions before 16.4.5
- GitLab CE/EE 16.5: All versions before 16.5.6
- GitLab CE/EE 16.6: All versions below 16.6.4
- GitLab CE/EE 16.7: All versions before 16.7.2
CVE-2023-4812
- GitLab CE/EE 15.3 and above and all versions before 16.5.5
- GitLab CE/EE 16.6: All versions before 16.6.4
- GitLab CE/EE 16.7 and later, all versions before 16.7.2
CVE-2023-5356
- GitLab CE/EE 8.13 and later and all versions before 16.5.6
- GitLab CE/EE 16.6 and later and all versions before 16.6.4
- GitLab CE/EE 16.7 and later and all versions before 16.7.2
CVE-2023-6955
- All versions of GitLab CE/EE before 16.5.6
- GitLab CE/EE 16.6 and later and all versions before 16.6.4
- GitLab CE/EE 16.7 and later and all versions before 16.7.2
CVE-2023-2030
- GitLab CE/EE 12.2 and later and all versions before 16.5.6
- GitLab CE/EE 16.6 or later and all versions before 16.6.4
- GitLab CE/EE 16.7 and later and all versions before 16.7.2
Resolved Vulnerabilities
- CVE-2023-7028: Account takeover vulnerability where a user account password reset email could be delivered to an unverified email.
- CVE-2023-4812: Required CODEOWNERS authorization bypass vulnerability.
- CVE-2023-5356: Vulnerability in integrated slack and mattermost that could allow slash commands to be forwarded to other users due to incorrect authentication checks.
- CVE-2023-6955: Improper access control vulnerability in GitLab Remote Development, which could allow an attacker to create a workspace in the root namespace associated with an agent in a different group.
- CVE-2023-2030: A vulnerability that could potentially modify the metadata of signed commits.
Vulnerability Patches
On January 11, the following vulnerability patches were made available. Users of affected versions are advised to update to the latest version.
CVE-2023-7028
- GitLab CE/EE versions 16.1.6, 16.2.9, 16.3.7, 16.4.5, 16.5.6, 16.6.4, 16.7.2
CVE-2023-4812
- GitLab CE/EE 16.5.5, 16.6.4, 16.7.2 versions
CVE-2023-5356
- GitLab CE/EE 16.5.6, 16.6.4, 16.7.2 versions
CVE-2023-6955
- GitLab CE/EE 16.5.6, 16.6.4, 16.7.2 versions
CVE-2023-2030
- GitLab CE/EE 16.5.6, 16.6.4, 16.7.2 versions
Referenced Sites
[1] https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/