Lucene search

K
vulnrichmentGitLabVULNRICHMENT:CVE-2023-4378
HistorySep 01, 2023 - 10:30 a.m.

CVE-2023-4378 Exposure of Sensitive Information to an Unauthorized Actor in GitLab

2023-09-0110:30:31
CWE-200
GitLab
github.com
2
cve-2023-4378
gitlab
sensitive information
sentry
unauthorized actor
incomplete fix

CVSS3

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N

AI Score

6.4

Confidence

Low

EPSS

0.001

Percentile

35.5%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A malicious Maintainer can, under specific circumstances, leak the sentry token by changing the configured URL in the Sentry error tracking settings page. This was as a result of an incomplete fix for CVE-2022-4365.

CVSS3

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N

AI Score

6.4

Confidence

Low

EPSS

0.001

Percentile

35.5%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial