CVE-2023-3484: CWE-863: Incorrect Authorization in GitLab GitLab
An issue has been discovered in GitLab EE affecting all versions starting from 12.8 before 15.11.11, all versions starting from 16.0 before 16.0.7, all versions starting from 16.1 before 16.1.2. An attacker could change the name or path of a public top-level group in certain situations.
AI Analysis
Technical Summary
CVE-2023-3484 is a high-severity vulnerability classified under CWE-863 (Incorrect Authorization) affecting GitLab Enterprise Edition (EE). The flaw exists in all GitLab EE versions starting from 12.8 up to but not including 15.11.11, versions from 16.0 up to 16.0.7, and versions from 16.1 up to 16.1.2. The vulnerability allows an attacker with limited privileges (low privilege) and requiring user interaction to change the name or path of a public top-level group under certain conditions. This is an authorization bypass issue where the system does not properly verify if the user has sufficient rights to perform the group rename or path change operation. The CVSS v3.1 score of 8.0 reflects a high severity, with network attack vector, high attack complexity, low privileges required, and user interaction needed. The impact is critical as it affects confidentiality, integrity, and availability (C, I, A all high). Changing the name or path of a public top-level group can disrupt repository access, break integrations, and cause confusion or misdirection in project management. Since GitLab is widely used for source code management and CI/CD pipelines, this vulnerability could be exploited to interfere with software development workflows, potentially leading to code tampering, denial of service, or information disclosure. No known exploits in the wild have been reported yet, but the vulnerability has been publicly disclosed and patched in later versions. The lack of patch links in the provided data suggests users should consult official GitLab advisories for remediation details.
Potential Impact
For European organizations, the impact of this vulnerability can be significant given the widespread adoption of GitLab in software development, including critical infrastructure, government agencies, and private enterprises. Unauthorized changes to group names or paths can disrupt access controls, leading to potential exposure of sensitive source code or interruption of development pipelines. This could delay software releases, cause operational downtime, and increase risk of supply chain attacks if attackers manipulate repository paths to inject malicious code or redirect developers. Confidentiality is at risk if unauthorized users gain access to repositories due to path changes. Integrity is compromised as attackers could manipulate repository structure or metadata. Availability is affected by potential denial of access to projects or CI/CD pipelines. European organizations with public-facing GitLab groups are particularly vulnerable as the flaw specifically involves public top-level groups. The requirement for user interaction and low privileges means insider threats or social engineering attacks could exploit this vulnerability. The high CVSS score underscores the critical nature of the threat to European entities relying on GitLab for secure and reliable software development.
Mitigation Recommendations
European organizations should immediately verify their GitLab EE version and upgrade to the fixed versions: 15.11.11 or later for the 15.x branch, 16.0.7 or later for the 16.0 branch, and 16.1.2 or later for the 16.1 branch. Until patching is complete, restrict permissions to rename or modify public top-level groups to only highly trusted administrators. Implement strict monitoring and alerting on group rename or path change events to detect suspicious activity quickly. Conduct audits of group configurations and access controls to ensure no unauthorized changes have occurred. Educate users about the risk of social engineering attacks that could trigger user interaction exploitation. Consider isolating critical projects in private groups where possible to reduce exposure. Review and tighten CI/CD pipeline permissions and integrations that rely on group paths to prevent disruption. Finally, maintain an incident response plan to rapidly address any exploitation attempts or operational impacts stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2023-3484: CWE-863: Incorrect Authorization in GitLab GitLab
Description
An issue has been discovered in GitLab EE affecting all versions starting from 12.8 before 15.11.11, all versions starting from 16.0 before 16.0.7, all versions starting from 16.1 before 16.1.2. An attacker could change the name or path of a public top-level group in certain situations.
AI-Powered Analysis
Technical Analysis
CVE-2023-3484 is a high-severity vulnerability classified under CWE-863 (Incorrect Authorization) affecting GitLab Enterprise Edition (EE). The flaw exists in all GitLab EE versions starting from 12.8 up to but not including 15.11.11, versions from 16.0 up to 16.0.7, and versions from 16.1 up to 16.1.2. The vulnerability allows an attacker with limited privileges (low privilege) and requiring user interaction to change the name or path of a public top-level group under certain conditions. This is an authorization bypass issue where the system does not properly verify if the user has sufficient rights to perform the group rename or path change operation. The CVSS v3.1 score of 8.0 reflects a high severity, with network attack vector, high attack complexity, low privileges required, and user interaction needed. The impact is critical as it affects confidentiality, integrity, and availability (C, I, A all high). Changing the name or path of a public top-level group can disrupt repository access, break integrations, and cause confusion or misdirection in project management. Since GitLab is widely used for source code management and CI/CD pipelines, this vulnerability could be exploited to interfere with software development workflows, potentially leading to code tampering, denial of service, or information disclosure. No known exploits in the wild have been reported yet, but the vulnerability has been publicly disclosed and patched in later versions. The lack of patch links in the provided data suggests users should consult official GitLab advisories for remediation details.
Potential Impact
For European organizations, the impact of this vulnerability can be significant given the widespread adoption of GitLab in software development, including critical infrastructure, government agencies, and private enterprises. Unauthorized changes to group names or paths can disrupt access controls, leading to potential exposure of sensitive source code or interruption of development pipelines. This could delay software releases, cause operational downtime, and increase risk of supply chain attacks if attackers manipulate repository paths to inject malicious code or redirect developers. Confidentiality is at risk if unauthorized users gain access to repositories due to path changes. Integrity is compromised as attackers could manipulate repository structure or metadata. Availability is affected by potential denial of access to projects or CI/CD pipelines. European organizations with public-facing GitLab groups are particularly vulnerable as the flaw specifically involves public top-level groups. The requirement for user interaction and low privileges means insider threats or social engineering attacks could exploit this vulnerability. The high CVSS score underscores the critical nature of the threat to European entities relying on GitLab for secure and reliable software development.
Mitigation Recommendations
European organizations should immediately verify their GitLab EE version and upgrade to the fixed versions: 15.11.11 or later for the 15.x branch, 16.0.7 or later for the 16.0 branch, and 16.1.2 or later for the 16.1 branch. Until patching is complete, restrict permissions to rename or modify public top-level groups to only highly trusted administrators. Implement strict monitoring and alerting on group rename or path change events to detect suspicious activity quickly. Conduct audits of group configurations and access controls to ensure no unauthorized changes have occurred. Educate users about the risk of social engineering attacks that could trigger user interaction exploitation. Consider isolating critical projects in private groups where possible to reduce exposure. Review and tighten CI/CD pipeline permissions and integrations that rely on group paths to prevent disruption. Finally, maintain an incident response plan to rapidly address any exploitation attempts or operational impacts stemming from this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2023-06-30T17:18:21.746Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ea68a0acd01a249253f47
Added to database: 5/22/2025, 4:22:34 AM
Last enriched: 7/7/2025, 11:26:46 AM
Last updated: 8/8/2025, 9:42:47 PM
Views: 16
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.