CVE-2023-3363
GitLab vulnerability analysis and mitigation

Overview

An information disclosure vulnerability (CVE-2023-3363) was identified in GitLab CE/EE affecting all versions from 13.6 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, and all versions from 16.1 prior to 16.1.1. The vulnerability resulted in webhook tokens being exposed in Sidekiq logs when the log format was set to 'default' (GitLab Security Release).

Technical details

The vulnerability is classified as CWE-532 (Insertion of Sensitive Information into Log File) with a CVSS v3.1 score of 3.9 (LOW) and vector string CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N. The issue occurs specifically when the Sidekiq logging format is set to 'default', causing the X-Gitlab-Token to be displayed in clear text during the WebHooks::LogExecutionWorker execution (NVD).

Impact

The vulnerability could lead to the exposure of webhook tokens in log files, potentially compromising the security of webhook communications. When exploited, this could allow attackers with access to log files to intercept and potentially abuse webhook tokens (GitLab Security Release).

Mitigation and workarounds

The vulnerability has been patched in GitLab versions 15.11.10, 16.0.6, and 16.1.1. Organizations are strongly recommended to upgrade to these or later versions immediately. As a temporary workaround, organizations can consider changing the log format to 'json' instead of 'default' as the issue does not occur with json logging format (GitLab Security Release).

Community reactions

The vulnerability was reported by Martin Vaisset from MyMoneyBank and was addressed as part of GitLab's security release process. GitLab has classified this as a low-severity issue due to its limited impact and high requirements for exploitation (GitLab Security Release).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management