Rapid7 Vulnerability & Exploit Database

Gitlab: CVE-2023-5009: Attacker can abuse scan execution policies to run pipelines as another user

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Gitlab: CVE-2023-5009: Attacker can abuse scan execution policies to run pipelines as another user

Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
09/18/2023
Created
09/25/2023
Added
09/25/2023
Modified
09/26/2023

Description

From version 13.12 to 16.2.7 and from 16.3 to 16.3.4 in GitLab CE/EE it is possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. Instances running these versions are only vulnerable if direct transfers and security policies are both enabled. This is a bypass of CVE-2023-3932.

Solution(s)

  • gitlab-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;