
Cloud Vulnerability DB
A community-led vulnerabilities database
A missing authorization check vulnerability (CVE-2023-6955) was discovered in GitLab Remote Development affecting all versions prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2. The vulnerability was discovered internally by GitLab team member j.seto and disclosed on January 11, 2024 (GitLab Release).
The vulnerability stems from an improper access control mechanism in GitLab Remote Development that allows an attacker to create a workspace in one group that is associated with an agent from another group. The issue has been assigned a CVSS v3.1 base score of 6.6 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N (NVD).
The vulnerability allows attackers to violate namespace isolation by creating workspaces in one group/namespace hierarchy that are associated with agents from a different group. This could potentially lead to unauthorized access to cluster resources and sensitive data depending on the volume shares and permissions set up in the cluster (GitLab Issue).
The vulnerability has been patched in GitLab versions 16.5.6, 16.6.4, and 16.7.2. Users are strongly recommended to upgrade to these or newer versions immediately. The fix implements proper authorization checks to ensure workspaces can only be created under the same root namespace as the agent (GitLab Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."