CVE-2023-1965Cross-Site Request Forgery in Gitlab

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 81.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 3

Description

An issue has been discovered in GitLab EE affecting all versions starting from 14.2 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Lack of verification on RelayState parameter allowed a maliciously crafted URL to obtain access tokens granted for 3rd party Group SAML SSO logins. This feature isn't enabled by default.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages5 packages

NVDgitlab/gitlab14.215.9.6+2
CVEListV5gitlab/gitlab>=14.2, <15.9.6, >=15.10, <15.10.5, >=15.11, <15.11.1+2
debiandebian/gitlab
gitlabgitlab/gitlab

🔴Vulnerability Details

1
GHSA
GHSA-cxfp-vwqp-ghxf: An issue has been discovered in GitLab EE affecting all versions starting from 142023-05-03

📋Vendor Advisories

2
GitLab
CVE-2023-1965: An issue has been discovered in GitLab EE affecting all versions starting from 14.2 before 15.9.6, all versions starting from 15.10 before 15.10.5, al2023-05-03
Debian
CVE-2023-1965: gitlab - An issue has been discovered in GitLab EE affecting all versions starting from 1...2023