
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-5332 is a vulnerability in GitLab Enterprise Edition (EE) related to the third-party library Consul. The vulnerability was discovered and reported by a customer, with the initial disclosure occurring in September 2023. The issue affects GitLab-EE versions from 9.5.0 up to 16.2.8, and from 16.3.0 up to 16.3.5, as well as version 16.4.0 (NVD).
The vulnerability involves a configuration setting in the Consul library where 'enable-script-checks' must be set to False to enable proper patch functionality. Without this setting, the implemented patch could be bypassed. The vulnerability has received varying CVSS scores, with NVD assigning a score of 8.1 (HIGH) with vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, while GitLab Inc. assessed it at 5.9 (MEDIUM) with vector CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N (NVD).
The vulnerability could potentially lead to remote code execution (RCE) in specific configurations. When the 'enable-script-checks' setting is not properly configured, it could allow attackers to bypass security controls implemented by the patch (HashiCorp Blog).
The vulnerability has been patched in GitLab versions 16.2.8, 16.3.5, and 16.4.1. The primary mitigation requires setting 'enable-script-checks' to False in the Consul configuration. Users are strongly advised to upgrade to the patched versions and ensure proper configuration of the Consul library (GitLab Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."