vulnerability
Gitlab: CVE-2023-5009: Attacker can abuse scan execution policies to run pipelines as another user
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Sep 18, 2023 | Sep 25, 2023 | Sep 26, 2023 |
Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Sep 18, 2023
Added
Sep 25, 2023
Modified
Sep 26, 2023
Description
From version 13.12 to 16.2.7 and from 16.3 to 16.3.4 in GitLab CE/EE it is possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. Instances running these versions are only vulnerable if direct transfers and security policies are both enabled. This is a bypass of CVE-2023-3932.
Solution
gitlab-upgrade-latest
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.