Lucene search

K
cve[email protected]CVE-2023-7028
HistoryJan 12, 2024 - 2:15 p.m.

CVE-2023-7028

2024-01-1214:15:49
CWE-284
CWE-640
web.nvd.nist.gov
59
In Wild
29
cve
2023
7028
gitlab
ce
ee
password reset
email address
vulnerability
security
nvd

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

7.5 High

AI Score

Confidence

High

0.96 High

EPSS

Percentile

99.5%

An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.

Affected configurations

NVD
Node
gitlabgitlabRange16.1.016.1.6community
OR
gitlabgitlabRange16.1.016.1.6enterprise
OR
gitlabgitlabRange16.2.016.2.9community
OR
gitlabgitlabRange16.2.016.2.9enterprise
OR
gitlabgitlabRange16.3.016.3.7community
OR
gitlabgitlabRange16.3.016.3.7enterprise
OR
gitlabgitlabRange16.4.016.4.5community
OR
gitlabgitlabRange16.4.016.4.5enterprise
OR
gitlabgitlabRange16.5.016.5.6community
OR
gitlabgitlabRange16.5.016.5.6enterprise
OR
gitlabgitlabRange16.6.016.6.4community
OR
gitlabgitlabRange16.6.016.6.4enterprise
OR
gitlabgitlabRange16.7.016.7.2community
OR
gitlabgitlabRange16.7.016.7.2enterprise

CNA Affected

[
  {
    "vendor": "GitLab",
    "product": "GitLab",
    "repo": "git://[email protected]:gitlab-org/gitlab.git",
    "versions": [
      {
        "version": "16.1",
        "status": "affected",
        "lessThan": "16.1.6",
        "versionType": "semver"
      },
      {
        "version": "16.2",
        "status": "affected",
        "lessThan": "16.2.9",
        "versionType": "semver"
      },
      {
        "version": "16.3",
        "status": "affected",
        "lessThan": "16.3.7",
        "versionType": "semver"
      },
      {
        "version": "16.4",
        "status": "affected",
        "lessThan": "16.4.5",
        "versionType": "semver"
      },
      {
        "version": "16.5",
        "status": "affected",
        "lessThan": "16.5.6",
        "versionType": "semver"
      },
      {
        "version": "16.6",
        "status": "affected",
        "lessThan": "16.6.4",
        "versionType": "semver"
      },
      {
        "version": "16.7",
        "status": "affected",
        "lessThan": "16.7.2",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

Social References

More

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

7.5 High

AI Score

Confidence

High

0.96 High

EPSS

Percentile

99.5%