CVE-2023-1965

An issue has been discovered in GitLab EE affecting all versions starting from 14.2 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Lack of verification on RelayState parameter allowed a maliciously crafted URL to obtain access tokens granted for 3rd party Group SAML SSO logins. This feature isn't enabled by default.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 07:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 6.8
References () https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1965.json - Third Party Advisory () https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1965.json - Third Party Advisory
References () https://gitlab.com/gitlab-org/gitlab/-/issues/406235 - Broken Link () https://gitlab.com/gitlab-org/gitlab/-/issues/406235 - Broken Link
References () https://hackerone.com/reports/1923672 - Permissions Required () https://hackerone.com/reports/1923672 - Permissions Required

Information

Published : 2023-05-03 21:15

Updated : 2024-11-21 07:40


NVD link : CVE-2023-1965

Mitre link : CVE-2023-1965

CVE.ORG link : CVE-2023-1965


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-352

Cross-Site Request Forgery (CSRF)