CVE-2023-5612

CVSS 3.1 Score 5.3 of 10 (medium)

Details

Published Jan 26, 2024
Updated: Jan 31, 2024
CWE ID 200

Summary

CVE-2023-5612 is a vulnerability found in GitLab affecting all versions before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. This vulnerability allows an attacker to read the user email address via tags feed, even if the visibility in the user profile has been disabled. The vulnerability has a base severity rating of MEDIUM with a base score of 5.3 according to CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N vector string. It does not require any privileges and does not involve user interaction, making it accessible remotely over the network. The impact of this vulnerability on an organization is relatively low in terms of confidentiality, with a rating of LOW, as only user email addresses can be accessed. To remediate this vulnerability, organizations should update their GitLab instances to version 16.6.6, 16.7.4, or 16.8.1 or later to mitigate the risk of exposure to this information exposure vulnerability (CWE-200).

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-5612 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions