CVE-2023-5612

CVSS 3.1 Score 5.3 of 10 (medium)

Details

Published Jan 26, 2024
Updated: Jan 31, 2024
CWE ID 200

Summary

CVE-2023-5612 is a vulnerability found in GitLab affecting all versions before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. This vulnerability allows an attacker to read the user email address via tags feed, even if the visibility in the user profile has been disabled. The vulnerability has a base severity rating of MEDIUM with a base score of 5.3 according to CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N vector string. It does not require any privileges and does not involve user interaction, making it accessible remotely over the network. The impact of this vulnerability on an organization is relatively low in terms of confidentiality, with a rating of LOW, as only user email addresses can be accessed. To remediate this vulnerability, organizations should update their GitLab instances to version 16.6.6, 16.7.4, or 16.8.1 or later to mitigate the risk of exposure to this information exposure vulnerability (CWE-200).

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-5612 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options