← Back to CVEs
CVE-2023-4378
MEDIUM5.5
Description
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A malicious Maintainer can, under specific circumstances, leak the sentry token by changing the configured URL in the Sentry error tracking settings page. This was as a result of an incomplete fix for CVE-2022-4365.
CVE Details
CVSS v3.1 Score5.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published9/1/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
gitlab:gitlab
Weaknesses (CWE)
CWE-201
References
https://gitlab.com/gitlab-org/gitlab/-/issues/422134(cve@gitlab.com)
https://hackerone.com/reports/2104591(cve@gitlab.com)
https://gitlab.com/gitlab-org/gitlab/-/issues/422134(af854a3a-2127-422b-91ae-364da2661108)
https://hackerone.com/reports/2104591(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.