vulnerability

Gitlab: CVE-2023-5009: Attacker can abuse scan execution policies to run pipelines as another user

Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Sep 18, 2023
Added
Sep 25, 2023
Modified
Sep 26, 2023

Description

From version 13.12 to 16.2.7 and from 16.3 to 16.3.4 in GitLab CE/EE it is possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. Instances running these versions are only vulnerable if direct transfers and security policies are both enabled. This is a bypass of CVE-2023-3932.

Solution

gitlab-upgrade-latest
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.