Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44080 | An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to read the source code of a project through a fork created before changing visibility to only project members. |
Solution
Upgrade to versions 16.4.1, 16.3.5, 16.2.8 or above.
Workaround
No workaround given by the vendor.
Thu, 03 Oct 2024 16:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 |
Thu, 03 Oct 2024 15:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Exposure of Sensitive Information to an Unauthorized Actor in GitLab | Insertion of Sensitive Information Into Sent Data in GitLab |
| Weaknesses | CWE-201 |
Thu, 19 Sep 2024 11:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 01 Sep 2024 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 31 Aug 2024 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Aug 2024 00:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:* |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2025-11-20T04:07:38.285Z
Reserved: 2023-06-26T15:18:03.657Z
Link: CVE-2023-3413
Updated: 2024-08-02T06:55:03.412Z
Status : Modified
Published: 2023-09-29T09:15:10.180
Modified: 2024-11-21T08:17:12.890
Link: CVE-2023-3413
No data.
OpenCVE Enrichment
No data.
EUVD