CVE-2022-4462
https://notcve.org/view.php?id=CVE-2022-4462
An issue has been discovered in GitLab affecting all versions starting from 12.8 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. This vulnerability could allow a user to unmask the Discord Webhook URL through viewing the raw API response. • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4462.json https://gitlab.com/gitlab-org/gitlab/-/issues/385669 https://hackerone.com/reports/1796210 •
CVE-2023-0050
https://notcve.org/view.php?id=CVE-2023-0050
An issue has been discovered in GitLab affecting all versions starting from 13.7 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A specially crafted Kroki diagram could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims. • https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0050.json https://gitlab.com/gitlab-org/gitlab/-/issues/387023 https://hackerone.com/reports/1731349 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2023-1084
https://notcve.org/view.php?id=CVE-2023-1084
An issue has been discovered in GitLab CE/EE affecting all versions before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A malicious project Maintainer may create a Project Access Token with Owner level privileges using a crafted request. • https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1084.json https://gitlab.com/gitlab-org/gitlab/-/issues/390696 https://hackerone.com/reports/1805549 •
CVE-2022-4331
https://notcve.org/view.php?id=CVE-2022-4331
An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group. • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4331.json https://gitlab.com/gitlab-org/gitlab/-/issues/385050 https://hackerone.com/reports/1791518 •
CVE-2023-1072
https://notcve.org/view.php?id=CVE-2023-1072
An issue has been discovered in GitLab affecting all versions starting from 9.0 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. It was possible to trigger a resource depletion attack due to improper filtering for number of requests to read commits details. • https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1072.json https://gitlab.com/gitlab-org/gitlab/-/issues/219619 • CWE-400: Uncontrolled Resource Consumption •