Skip to main content

CVE-2023-0120: CWE-863: Incorrect Authorization in GitLab GitLab

Low
VulnerabilityCVE-2023-0120cvecve-2023-0120cwe-863
Published: Fri Sep 01 2023 (09/01/2023, 10:01:51 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

An issue has been discovered in GitLab affecting all versions starting from 10.0 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. Due to improper permission validation it was possible to edit labels description by an unauthorised user.

AI-Powered Analysis

AILast updated: 07/07/2025, 11:09:57 UTC

Technical Analysis

CVE-2023-0120 is a security vulnerability identified in GitLab, a widely used web-based DevOps lifecycle tool that provides source code repository management, CI/CD pipelines, and issue tracking. The vulnerability affects multiple versions of GitLab, specifically all versions starting from 10.0 up to but not including 16.1.5, versions from 16.2 up to but not including 16.2.5, and versions from 16.3 up to but not including 16.3.1. The root cause of the vulnerability is improper permission validation, classified under CWE-863 (Incorrect Authorization). This flaw allows an unauthorized user with limited privileges (requiring some level of authentication but not elevated privileges) to edit the description of labels within GitLab projects. Labels are metadata tags used to organize and categorize issues, merge requests, and other project elements. Although the vulnerability does not allow direct modification of code or critical project data, unauthorized editing of label descriptions could be leveraged for social engineering, misinformation, or subtle manipulation of project workflows. The CVSS v3.1 base score is 3.5, indicating a low severity level. The vector string (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires low privileges, and user interaction, and impacts only integrity (limited to label descriptions) without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no official patch links were provided in the source data, though GitLab typically addresses such issues promptly in subsequent releases. This vulnerability highlights the importance of strict authorization checks even on seemingly minor features like label descriptions, as they can be abused in broader attack scenarios.

Potential Impact

For European organizations, the impact of CVE-2023-0120 is generally low but not negligible. GitLab is widely adopted across Europe by enterprises, public sector organizations, and software development teams for managing source code and project workflows. Unauthorized modification of label descriptions could lead to misinformation within project management processes, potentially causing confusion or misdirection in issue prioritization and resolution. While this does not directly compromise source code integrity or confidentiality, it could be exploited as part of a multi-stage attack, for example, by misleading developers or reviewers. Organizations with strict compliance requirements or those operating in highly regulated sectors (e.g., finance, healthcare, critical infrastructure) may find even low-severity vulnerabilities concerning due to the potential for indirect impacts on operational integrity. Additionally, since the vulnerability requires low privileges but some authentication, insider threats or compromised low-level accounts could exploit this flaw. The absence of known exploits reduces immediate risk, but the widespread use of GitLab in Europe means that unpatched instances remain a potential target for opportunistic attackers.

Mitigation Recommendations

To mitigate CVE-2023-0120, European organizations should: 1) Immediately verify their GitLab instance version and plan upgrades to the fixed versions (16.1.5, 16.2.5, or 16.3.1 or later) as soon as they become available. 2) Implement strict access control policies limiting label editing permissions only to trusted roles and users, minimizing the number of users with label modification rights. 3) Monitor GitLab audit logs for unusual label description changes, especially from accounts with low privileges, to detect potential exploitation attempts early. 4) Educate developers and project managers about the risk of misinformation through label tampering and encourage verification of critical project metadata. 5) Employ network segmentation and multi-factor authentication (MFA) to reduce the risk of unauthorized access to GitLab accounts. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect anomalous API calls related to label editing if feasible. 7) Stay informed through GitLab security advisories and subscribe to vulnerability feeds to promptly apply patches and updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2023-01-09T14:16:54.573Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ea68a0acd01a249253f05

Added to database: 5/22/2025, 4:22:34 AM

Last enriched: 7/7/2025, 11:09:57 AM

Last updated: 8/4/2025, 1:07:21 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats