CVE-2023-5612
CVSS 3.1 Score 5.3 of 10 (medium)
Details
Summary
CVE-2023-5612 is a vulnerability found in GitLab affecting all versions before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. This vulnerability allows an attacker to read the user email address via tags feed, even if the visibility in the user profile has been disabled. The vulnerability has a base severity rating of MEDIUM with a base score of 5.3 according to CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N vector string. It does not require any privileges and does not involve user interaction, making it accessible remotely over the network. The impact of this vulnerability on an organization is relatively low in terms of confidentiality, with a rating of LOW, as only user email addresses can be accessed. To remediate this vulnerability, organizations should update their GitLab instances to version 16.6.6, 16.7.4, or 16.8.1 or later to mitigate the risk of exposure to this information exposure vulnerability (CWE-200).
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions