An issue has been discovered in GitLab DAST API scanner affecting all versions starting from 1.6.50 before 2.11.0, where Authorization headers was leaked in vulnerability report evidence.
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0326.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/388132 | Exploit Vendor Advisory |
https://hackerone.com/reports/1826896 | Permissions Required |
https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0326.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/388132 | Exploit Vendor Advisory |
https://hackerone.com/reports/1826896 | Permissions Required |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:36
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.0 |
References | () https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0326.json - Vendor Advisory | |
References | () https://gitlab.com/gitlab-org/gitlab/-/issues/388132 - Exploit, Vendor Advisory | |
References | () https://hackerone.com/reports/1826896 - Permissions Required |
Information
Published : 2023-03-27 22:15
Updated : 2024-11-21 07:36
NVD link : CVE-2023-0326
Mitre link : CVE-2023-0326
CVE.ORG link : CVE-2023-0326
JSON object : View
Products Affected
gitlab
- dynamic_application_security_testing_analyzer
CWE