
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) was discovered, affecting versions 13.12 to 16.2.7 and versions 16.3 to 16.3.4. The vulnerability, initially identified by security researcher Johan Carlsson, is a bypass of a previously addressed vulnerability (CVE-2023-3932) from August, demonstrating increased severity and impact (Security Online).
The vulnerability received a CVSS v3.1 score of 9.6, categorizing it as critical. The issue specifically involves the ability to run pipelines as arbitrary users through scheduled security scan policies, representing a significant security bypass (GitLab Release).
The vulnerability allows attackers to impersonate users without their consent and execute pipeline tasks. This could potentially lead to unauthorized access to classified information, manipulation of user data, intellectual property theft, significant data breaches, and supply chain attacks within GitLab's ecosystem (Security Online).
GitLab has released security updates in versions 16.3.4 and 16.2.7 to address this vulnerability. For users unable to upgrade immediately, the recommended mitigation is to disable either the 'Direct transfers' or 'Security policies' features, as the vulnerability only exists when both features are enabled simultaneously (GitLab Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."