Skip to main content

CVE-2023-3511: CWE-863: Incorrect Authorization in GitLab GitLab

Low
VulnerabilityCVE-2023-3511cvecve-2023-3511cwe-863
Published: Fri Dec 15 2023 (12/15/2023, 15:31:04 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

An issue has been discovered in GitLab EE affecting all versions starting from 8.17 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. It was possible for auditor users to fork and submit merge requests to private projects they're not a member of.

AI-Powered Analysis

AILast updated: 07/07/2025, 11:27:30 UTC

Technical Analysis

CVE-2023-3511 is a security vulnerability classified under CWE-863 (Incorrect Authorization) affecting GitLab Enterprise Edition (EE). The flaw exists in all GitLab EE versions starting from 8.17 up to versions before 16.4.4, from 16.5 up to before 16.5.4, and from 16.6 up to before 16.6.2. The vulnerability allows users with the 'auditor' role—who typically have read-only access and limited permissions—to fork private projects and submit merge requests to those projects without being members. This behavior violates the intended authorization model, as auditor users should not be able to perform such actions on private repositories they do not belong to. The vulnerability requires the attacker to have auditor-level privileges and some user interaction, as indicated by the CVSS vector. The CVSS v3.1 base score is 2.0, reflecting a low severity primarily because the impact on confidentiality is none, the impact on integrity is low (limited to submitting merge requests), and availability is unaffected. Exploitation requires network access, high attack complexity, and privileges at the auditor level, with user interaction needed. No known exploits are currently reported in the wild. The vulnerability could allow unauthorized code contributions or attempts to influence private projects, potentially leading to minor integrity risks if merge requests are accepted without proper review. However, it does not allow direct code injection or unauthorized data access. No official patches or mitigation links are provided in the data, but upgrading to fixed versions beyond 16.4.4, 16.5.4, or 16.6.2 is implied as the resolution path.

Potential Impact

For European organizations using GitLab EE, especially those managing private repositories with sensitive or proprietary code, this vulnerability could pose a risk of unauthorized code contributions or attempts to influence project development workflows. Although the severity is low, the ability for auditor users to fork and submit merge requests to private projects they do not belong to could lead to increased review overhead and potential social engineering or insider threat scenarios if auditor accounts are compromised or misused. This might affect organizations with strict compliance requirements or those in regulated industries where code integrity and access controls are critical. The impact on confidentiality is negligible, but integrity could be marginally affected if merge requests are accepted without thorough review. Availability is not impacted. The vulnerability is less likely to cause direct data breaches but could be exploited to probe private projects or attempt privilege escalation through social engineering. Organizations relying heavily on GitLab EE for software development and collaboration should be aware of this issue to maintain secure development lifecycles.

Mitigation Recommendations

European organizations should immediately verify their GitLab EE version and plan upgrades to versions 16.4.4 or later, 16.5.4 or later, or 16.6.2 or later, as these contain fixes for CVE-2023-3511. Until upgrades are applied, organizations should restrict auditor role assignments to trusted personnel only and monitor auditor activities closely for unusual forking or merge request submissions. Implement strict code review policies to ensure no unauthorized merge requests are accepted without proper validation. Additionally, consider auditing GitLab user roles and permissions regularly to minimize unnecessary auditor privileges. Employ multi-factor authentication (MFA) for all GitLab accounts to reduce the risk of compromised auditor credentials. Network segmentation and access controls limiting GitLab access to internal or trusted networks can reduce exposure. Finally, maintain awareness of GitLab security advisories for any updates or patches related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2023-07-04T21:18:11.362Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ea68a0acd01a249253f4d

Added to database: 5/22/2025, 4:22:34 AM

Last enriched: 7/7/2025, 11:27:30 AM

Last updated: 8/11/2025, 12:03:43 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats