Lucene search

K
cvelistGitLabCVELIST:CVE-2023-1965
HistoryMay 03, 2023 - 12:00 a.m.

CVE-2023-1965

2023-05-0300:00:00
GitLab
www.cve.org
1
gitlab saml access

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

High

EPSS

0.003

Percentile

65.5%

An issue has been discovered in GitLab EE affecting all versions starting from 14.2 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Lack of verification on RelayState parameter allowed a maliciously crafted URL to obtain access tokens granted for 3rd party Group SAML SSO logins. This feature isn’t enabled by default.

CNA Affected

[
  {
    "vendor": "GitLab",
    "product": "GitLab",
    "versions": [
      {
        "version": ">=14.2, <15.9.6",
        "status": "affected"
      },
      {
        "version": ">=15.10, <15.10.5",
        "status": "affected"
      },
      {
        "version": ">=15.11, <15.11.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

High

EPSS

0.003

Percentile

65.5%

Related for CVELIST:CVE-2023-1965