Skip to main content

CVE-2023-3915: CWE-279: Incorrect Execution-Assigned Permissions in GitLab GitLab

Medium
VulnerabilityCVE-2023-3915cvecve-2023-3915cwe-279
Published: Fri Sep 01 2023 (09/01/2023, 10:01:16 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

An issue has been discovered in GitLab EE affecting all versions starting from 16.1 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. If an external user is given an owner role on any group, that external user may escalate their privileges on the instance by creating a service account in that group. This service account is not classified as external and may be used to access internal projects.

AI-Powered Analysis

AILast updated: 07/07/2025, 11:39:41 UTC

Technical Analysis

CVE-2023-3915 is a vulnerability identified in GitLab Enterprise Edition (EE) versions 16.1 through before 16.1.5, 16.2 through before 16.2.5, and 16.3 through before 16.3.1. The issue stems from incorrect execution-assigned permissions (CWE-279) related to the handling of external users granted the Owner role on any group within a GitLab instance. Specifically, if an external user is assigned the Owner role on a group, they can exploit this vulnerability by creating a service account within that group. This service account is not treated as external by the system, which allows the attacker to escalate privileges beyond what an external user should have. Consequently, the attacker can access internal projects that should be restricted, thereby breaching confidentiality and integrity of sensitive code repositories and project data. The vulnerability requires that the attacker already has Owner-level privileges on a group, which implies a high privilege requirement (PR:H). The attack vector is network-based (AV:N), and no user interaction is needed (UI:N). The vulnerability does not affect availability but impacts confidentiality and integrity significantly. The CVSS v3.1 base score is 6.5, categorized as medium severity. No known exploits are reported in the wild yet, but the potential for privilege escalation within GitLab instances makes this a critical concern for organizations relying on GitLab for source code management and CI/CD pipelines.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of software development processes. Many enterprises, including financial institutions, government agencies, and technology companies across Europe, use GitLab EE for managing source code and internal projects. An attacker exploiting this flaw could gain unauthorized access to sensitive internal projects, potentially exposing proprietary code, confidential business logic, or security controls embedded in code repositories. This could lead to intellectual property theft, sabotage of software integrity, or insertion of malicious code into production pipelines. The breach of internal projects could also undermine compliance with data protection regulations such as GDPR, especially if personal data or sensitive information is stored or processed within GitLab projects. Additionally, the ability to escalate privileges from an external user to a service account with internal access could facilitate lateral movement within an organization's infrastructure, increasing the risk of broader compromise.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade affected GitLab EE instances to the patched versions: 16.1.5 or later, 16.2.5 or later, and 16.3.1 or later. Until patches are applied, organizations should audit group memberships and remove or restrict Owner roles assigned to external users. Implement strict access control policies that limit the assignment of Owner roles to trusted internal users only. Additionally, monitor creation of service accounts within groups, especially those created by external users, and enforce logging and alerting on privilege escalations or unusual account creations. Employ role-based access control (RBAC) best practices to minimize the number of users with Owner privileges. Regularly review and rotate credentials associated with service accounts to reduce risk exposure. Finally, consider network segmentation and zero-trust principles to limit the impact of any compromised accounts within the GitLab environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2023-07-25T10:30:31.836Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ea68a0acd01a249253f66

Added to database: 5/22/2025, 4:22:34 AM

Last enriched: 7/7/2025, 11:39:41 AM

Last updated: 7/31/2025, 2:27:55 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats