CVE-2023-2022
GitLab vulnerability analysis and mitigation

Overview

A security vulnerability was discovered in GitLab CE/EE affecting all versions before 16.0.8 and versions from 16.1 before 16.1.3. The issue allows developers to create pipeline schedules on protected branches even when they don't have merge access permissions (NVD, GitLab Issue).

Technical details

The vulnerability stems from an authorization bypass in the Projects::PipelineSchedulesController. The controller uses the project as the subject for authorizecreatepipelineschedule!, but ProjectPolicy doesn't properly check the ref for permission :createpipeline_schedule. This allows developers to bypass branch protection rules and create pipeline schedules on branches they shouldn't have access to (GitLab Issue).

Impact

The vulnerability allows developers with no merge access to create pipeline schedules on protected branches, effectively bypassing the intended security controls. This undermines the branch protection mechanisms that are meant to restrict pipeline execution permissions on sensitive branches (GitLab Issue).

Mitigation and workarounds

The issue was addressed in GitLab versions 16.0.8 and 16.1.3. Organizations should upgrade to these or newer versions to protect against this vulnerability. The fix involves modifying the Projects::PipelineSchedulesController to implement proper authorization checks for pipeline schedules and updating the Ci::PipelineSchedulePolicy to correctly handle protected branch permissions (GitLab Issue).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management