
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in GitLab (CVE-2023-4532) affecting versions 16.2 through 16.2.8, 16.3 through 16.3.5, and version 16.4.0. The vulnerability allows users to link CI/CD jobs of private projects which they are not members of, representing an authorization bypass issue. This security flaw was identified on July 25, 2023, and publicly disclosed on September 29, 2023 (GitLab Issue).
The vulnerability stems from a lack of proper access control in GitLab's machine learning model experiments tracking feature. The issue exists in the handlebuildmetadata function within app/services/ml/experimenttracking/handlecandidategitlabmetadata_service.rb, which fails to perform permission checks when associating CI jobs with ML experiments. The vulnerability has been assigned a CVSS v3.1 base score of 4.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, indicating network accessibility with low attack complexity and required privileges (NVD).
The vulnerability has two primary impacts: unauthorized users can associate private CI/CD jobs from projects they don't have access to with their ML experiments, and they can partially leak private job information including the job name and the identity of users who triggered the jobs (GitLab Issue).
The vulnerability has been fixed in GitLab versions 16.2.8, 16.3.5, and 16.4.1. Users are advised to upgrade to these or later versions to mitigate the security risk (CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."