Rewterz Threat Alert – FormBook Malware – Active IOCs
May 3, 2023Rewterz Threat Alert – Earth Preta aka Mustang Panda APT Group – Active IOCs
May 3, 2023Rewterz Threat Alert – FormBook Malware – Active IOCs
May 3, 2023Rewterz Threat Alert – Earth Preta aka Mustang Panda APT Group – Active IOCs
May 3, 2023Severity
Medium
Analysis Summary
CVE-2022-4376 CVSS:3.1
GitLab could allow a remote authenticated attacker to obtain sensitive information. An attacker could exploit this vulnerability to map a private email of a GitLab user to their GitLab account on an instance.
CVE-2023-1836 CVSS:4.4
GitLab is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability using a specially crafted XML file in a repository in “raw” mode to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed.
CVE-2023-0756 CVSS:4.8
GitLab could allow a remote authenticated attacker to execute arbitrary code on the system. By using specially crafted name for main branch of a repository, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2023-0805 CVSS:4.9
GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by a flaw in the group member management. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass access restrictions.
CVE-2023-1178 CVSS:5.7
GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by the failure to guarantee file integrity when downloading source code or installation packages from a tag or from a release in web interface. By sending a specially crafted request, an attacker could exploit this vulnerability to compromise file integrity.
CVE-2023-1621 CVSS:6.5
GitLab could allow a remote authenticated attacker to bypass security restrictions. By sending a specially crafted request, an attacker could exploit this vulnerability to commit to projects even from a restricted IP address.
CVE-2023-1965 CVSS:6.8
GitLab could allow a remote attacker to obtain sensitive information, caused by the lack of verification on RelayState parameter. By using a specially crafted URL, an attacker could exploit this vulnerability to obtain access tokens granted for 3rd party Group SAML SSO logins.
CVE-2023-2182 CVSS:6.8
GitLab could allow a remote authenticated attacker to gain elevated privileges on the system, caused by a flaw when OpenID Connect is enabled on an instance. By sending a specially crafted request, an attacker could exploit this vulnerability to escalate privileges.
Impact
- Code Execution
- Privilege Escalation
- Cross-Site Scripting
- Security Bypass
- Information Disclosure
Indicators Of Compromise
CVE
- CVE-2022-4376
- CVE-2023-1836
- CVE-2023-0756
- CVE-2023-0805
- CVE-2023-1178
- CVE-2023-1621
- CVE-2023-1965
- CVE-2023-2182
Affected Vendors
GitLab
Affected Products
- GitLab Community Edition 15.11.0
- GitLab Community Edition 15.10.4
- GitLab Enterprise Edition 15.11.0
- GitLab Enterprise Edition 15.10.4
- GitLab Community Edition 15.9.5
- GitLab Enterprise Edition 15.9.5