An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2825.json | Third Party Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/412371 | Broken Link |
https://hackerone.com/reports/1994725 | Permissions Required Third Party Advisory |
https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2825.json | Third Party Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/412371 | Broken Link |
https://hackerone.com/reports/1994725 | Permissions Required Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-05-26 21:15
Updated : 2025-01-15 16:15
NVD link : CVE-2023-2825
Mitre link : CVE-2023-2825
CVE.ORG link : CVE-2023-2825
JSON object : View
Products Affected
gitlab
- gitlab
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')