CVE-2023-7028
GitLab Community and Enterprise Editions Improper Access Control Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
12Exploited in Wild
YesDecision
Descriptions
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
Se ha descubierto un problema en GitLab CE/EE que afecta a todas las versiones desde 16.1 anterior a 16.1.6, 16.2 anterior a 16.2.9, 16.3 anterior a 16.3.7, 16.4 anterior a 16.4.5, 16.5 anterior a 16.5.6, 16.6 antes de 16.6.4 y 16.7 antes de 16.7.2 en los que los correos electrónicos de restablecimiento de contraseña de cuenta de usuario podían enviarse a una dirección de correo electrónico no verificada.
GitLab CE/EE versions prior to 16.7.2 suffer from a password reset vulnerability.
GitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2023-12-20 CVE Reserved
- 2024-01-12 CVE Published
- 2024-01-12 First Exploit
- 2024-05-01 Exploited in Wild
- 2024-05-22 KEV Due Date
- 2024-10-03 CVE Updated
- 2024-11-07 EPSS Updated
CWE
- CWE-284: Improper Access Control
- CWE-640: Weak Password Recovery Mechanism for Forgotten Password
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/436084 | Broken Link | |
https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/51889 | 2024-03-14 | |
https://github.com/yoryio/CVE-2023-7028 | 2024-03-14 | |
https://github.com/mochammadrafi/CVE-2023-7028 | 2024-01-26 | |
https://github.com/soltanali0/CVE-2023-7028 | 2024-07-25 | |
https://github.com/Vozec/CVE-2023-7028 | 2024-01-13 | |
https://github.com/RandomRobbieBF/CVE-2023-7028 | 2024-01-12 | |
https://github.com/duy-31/CVE-2023-7028 | 2024-01-12 | |
https://github.com/thanhlam-attt/CVE-2023-7028 | 2024-01-23 | |
https://github.com/googlei1996/CVE-2023-7028 | 2024-01-12 | |
https://github.com/Trackflaw/CVE-2023-7028-Docker | 2024-01-25 | |
https://github.com/Shimon03/CVE-2023-7028-Account-Take-Over-Gitlab | 2024-01-23 | |
https://github.com/fa-rrel/CVE-2023-7028 | 2024-08-21 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.1.0 < 16.1.6 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.1.0 < 16.1.6" | community |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.1.0 < 16.1.6 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.1.0 < 16.1.6" | enterprise |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.2.0 < 16.2.9 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.2.0 < 16.2.9" | community |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.2.0 < 16.2.9 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.2.0 < 16.2.9" | enterprise |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.3.0 < 16.3.7 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.3.0 < 16.3.7" | community |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.3.0 < 16.3.7 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.3.0 < 16.3.7" | enterprise |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.4.0 < 16.4.5 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.4.0 < 16.4.5" | community |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.4.0 < 16.4.5 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.4.0 < 16.4.5" | enterprise |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.5.0 < 16.5.6 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.5.0 < 16.5.6" | community |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.5.0 < 16.5.6 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.5.0 < 16.5.6" | enterprise |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.6.0 < 16.6.4 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.6.0 < 16.6.4" | community |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.6.0 < 16.6.4 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.6.0 < 16.6.4" | enterprise |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.7.0 < 16.7.2 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.7.0 < 16.7.2" | community |
Affected
| ||||||
Gitlab Search vendor "Gitlab" | Gitlab Search vendor "Gitlab" for product "Gitlab" | >= 16.7.0 < 16.7.2 Search vendor "Gitlab" for product "Gitlab" and version " >= 16.7.0 < 16.7.2" | enterprise |
Affected
|