
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2023-4522) was discovered in GitLab affecting all versions before 16.2.0. The issue occurs when committing directories containing Line Feed (LF) characters, which results in 500 errors when attempting to view the commit through the GitLab web interface (NVD).
The vulnerability has a CVSS v3.1 Base Score of 5.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L. The issue manifests when directories containing LF characters (%0a or \n) are committed to a repository, causing various 500 Internal Server Errors when attempting to view commit details, merge request changes, or browse the affected directories in the web interface (GitLab Issue).
The vulnerability affects the availability of GitLab's web interface functionality. When exploited, it disrupts regular processes such as reviewing merge requests and viewing portions of a project via the web UI. While the commit details cannot be viewed in the Web UI, they remain accessible using a local git repository (GitLab Issue).
The vulnerability was fixed in GitLab version 16.2.0. Users should upgrade to this version or later to address the issue (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."