CVE-2023-3115: CWE-286: Incorrect User Management in GitLab GitLab
An issue has been discovered in GitLab EE affecting all versions affecting all versions from 11.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Single Sign On restrictions were not correctly enforced for indirect project members accessing public members-only project repositories.
AI Analysis
Technical Summary
CVE-2023-3115 is a medium-severity vulnerability identified in GitLab Enterprise Edition (EE) versions from 11.11 up to versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. The vulnerability stems from incorrect user management related to Single Sign-On (SSO) restrictions enforcement. Specifically, the issue affects indirect project members attempting to access public members-only project repositories. In this context, indirect project members are users who gain access to a project not through direct membership but via group membership or other nested access controls. The flaw allows these indirect members to bypass SSO restrictions that should normally limit access, potentially granting unauthorized read access to repository content. The vulnerability is classified under CWE-286 (Incorrect Authorization), indicating that the system fails to properly enforce access control policies. The CVSS v3.1 base score is 5.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality and integrity impact (C:L/I:L), with no impact on availability (A:N). No known exploits in the wild have been reported to date. The vulnerability affects a broad range of GitLab EE versions, which are widely used for source code management and DevOps lifecycle management in enterprises. The root cause is the failure to enforce SSO restrictions correctly for indirect members, which could lead to unauthorized information disclosure within organizations relying on GitLab for code hosting and collaboration.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to sensitive source code and project data, especially in environments where SSO is enforced to restrict access to certain projects. Unauthorized disclosure of source code can lead to intellectual property theft, exposure of security-sensitive information such as credentials or secrets embedded in code, and potential facilitation of further attacks such as supply chain compromises. Organizations using GitLab EE with SSO configurations are particularly at risk if they rely on indirect membership for access control. The impact is primarily confidentiality loss, with limited integrity impact and no availability impact. Given the widespread adoption of GitLab in European enterprises, including technology companies, financial institutions, and government agencies, the vulnerability could undermine trust in internal security controls and compliance with data protection regulations such as GDPR if sensitive data is exposed. However, the requirement for some level of privileges (indirect membership) and no user interaction reduces the likelihood of mass exploitation. Still, targeted attacks or insider threats could leverage this flaw to gain unauthorized access to project repositories.
Mitigation Recommendations
European organizations should promptly upgrade GitLab EE to the fixed versions: 16.2.8 or later, 16.3.5 or later, and 16.4.1 or later, depending on their current version. Until patching is complete, organizations should audit indirect project memberships and SSO configurations to ensure that access controls are as restrictive as possible. Specifically, review group memberships and nested access rights to minimize indirect access to sensitive projects. Implement monitoring and alerting on unusual access patterns to public members-only repositories, especially from indirect members. Additionally, consider temporarily disabling indirect membership access to sensitive projects if feasible. Organizations should also review their SSO integration settings to confirm that enforcement policies are correctly applied and test access restrictions thoroughly. Employing the principle of least privilege in project memberships and regularly reviewing access rights can reduce exposure. Finally, maintain an incident response plan to address any potential unauthorized access incidents stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
CVE-2023-3115: CWE-286: Incorrect User Management in GitLab GitLab
Description
An issue has been discovered in GitLab EE affecting all versions affecting all versions from 11.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Single Sign On restrictions were not correctly enforced for indirect project members accessing public members-only project repositories.
AI-Powered Analysis
Technical Analysis
CVE-2023-3115 is a medium-severity vulnerability identified in GitLab Enterprise Edition (EE) versions from 11.11 up to versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. The vulnerability stems from incorrect user management related to Single Sign-On (SSO) restrictions enforcement. Specifically, the issue affects indirect project members attempting to access public members-only project repositories. In this context, indirect project members are users who gain access to a project not through direct membership but via group membership or other nested access controls. The flaw allows these indirect members to bypass SSO restrictions that should normally limit access, potentially granting unauthorized read access to repository content. The vulnerability is classified under CWE-286 (Incorrect Authorization), indicating that the system fails to properly enforce access control policies. The CVSS v3.1 base score is 5.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality and integrity impact (C:L/I:L), with no impact on availability (A:N). No known exploits in the wild have been reported to date. The vulnerability affects a broad range of GitLab EE versions, which are widely used for source code management and DevOps lifecycle management in enterprises. The root cause is the failure to enforce SSO restrictions correctly for indirect members, which could lead to unauthorized information disclosure within organizations relying on GitLab for code hosting and collaboration.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to sensitive source code and project data, especially in environments where SSO is enforced to restrict access to certain projects. Unauthorized disclosure of source code can lead to intellectual property theft, exposure of security-sensitive information such as credentials or secrets embedded in code, and potential facilitation of further attacks such as supply chain compromises. Organizations using GitLab EE with SSO configurations are particularly at risk if they rely on indirect membership for access control. The impact is primarily confidentiality loss, with limited integrity impact and no availability impact. Given the widespread adoption of GitLab in European enterprises, including technology companies, financial institutions, and government agencies, the vulnerability could undermine trust in internal security controls and compliance with data protection regulations such as GDPR if sensitive data is exposed. However, the requirement for some level of privileges (indirect membership) and no user interaction reduces the likelihood of mass exploitation. Still, targeted attacks or insider threats could leverage this flaw to gain unauthorized access to project repositories.
Mitigation Recommendations
European organizations should promptly upgrade GitLab EE to the fixed versions: 16.2.8 or later, 16.3.5 or later, and 16.4.1 or later, depending on their current version. Until patching is complete, organizations should audit indirect project memberships and SSO configurations to ensure that access controls are as restrictive as possible. Specifically, review group memberships and nested access rights to minimize indirect access to sensitive projects. Implement monitoring and alerting on unusual access patterns to public members-only repositories, especially from indirect members. Additionally, consider temporarily disabling indirect membership access to sensitive projects if feasible. Organizations should also review their SSO integration settings to confirm that enforcement policies are correctly applied and test access restrictions thoroughly. Employing the principle of least privilege in project memberships and regularly reviewing access rights can reduce exposure. Finally, maintain an incident response plan to address any potential unauthorized access incidents stemming from this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2023-06-06T03:19:59.543Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ea68a0acd01a249253f28
Added to database: 5/22/2025, 4:22:34 AM
Last enriched: 7/7/2025, 11:12:24 AM
Last updated: 8/4/2025, 6:52:46 AM
Views: 13
Related Threats
CVE-2025-8987: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8986: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-31987: CWE-405 Asymmetric Resource Consumption in HCL Software Connections Docs
MediumCVE-2025-8985: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8984: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.