
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-2181 is a security vulnerability discovered in GitLab affecting all versions before 15.9.8, 15.10.0 before 15.10.7, and 15.11.0 before 15.11.3. The vulnerability was discovered by researcher inspector-ambitious through GitLab's HackerOne bug bounty program and was disclosed on May 10, 2023 (GitLab Release).
The vulnerability allows a malicious developer to use a git feature called refs/replace to smuggle content into a merge request that would not be visible during review in the UI. The issue has been assigned a CVSS score of 6.3 (Medium) with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N (GitLab Release).
A collaborator with Developer role can bypass branch protection and smuggle malicious content in a merge request, potentially introducing security vulnerabilities or other types of defects into the codebase. This could compromise the repository's integrity and security, potentially leading to sensitive data leaks, unauthorized resource access, or system compromise (GitLab Issue).
The vulnerability has been patched in GitLab versions 15.9.8, 15.10.7, and 15.11.3. GitLab strongly recommends that all installations running affected versions be upgraded to the latest version immediately. GitLab.com has already been updated with the patched version (GitLab Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."