Skip to main content

CVE-2023-3950: CWE-312: Cleartext Storage of Sensitive Information in GitLab GitLab

Medium
VulnerabilityCVE-2023-3950cvecve-2023-3950cwe-312
Published: Fri Sep 01 2023 (09/01/2023, 10:30:46 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

An information disclosure issue in GitLab EE affecting all versions from 16.2 prior to 16.2.5, and 16.3 prior to 16.3.1 allowed other Group Owners to see the Public Key for a Google Cloud Logging audit event streaming destination, if configured. Owners can now only write the key, not read it.

AI-Powered Analysis

AILast updated: 07/07/2025, 11:41:07 UTC

Technical Analysis

CVE-2023-3950 is a medium-severity information disclosure vulnerability affecting GitLab Enterprise Edition versions 16.2 up to but not including 16.2.5, and 16.3 up to but not including 16.3.1. The vulnerability arises from improper handling of sensitive information related to Google Cloud Logging audit event streaming destinations. Specifically, the Public Key used for this audit event streaming was stored in cleartext and accessible to all Group Owners within a GitLab instance. This means that any Group Owner could read the Public Key, which should be treated as sensitive information, potentially leading to unauthorized information disclosure. The vulnerability is categorized under CWE-312, which pertains to cleartext storage of sensitive data. The issue was addressed by changing permissions so that Group Owners can write the key but no longer have read access. The CVSS v3.1 base score is 5.5, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low, with no impact on availability. No known exploits are reported in the wild at the time of publication. This vulnerability primarily impacts organizations using GitLab EE with Google Cloud Logging audit event streaming configured, where multiple Group Owners exist, potentially exposing sensitive cryptographic material to unauthorized privileged users within the same organization.

Potential Impact

For European organizations, the impact of CVE-2023-3950 depends largely on their use of GitLab EE and Google Cloud Logging audit event streaming. Organizations that rely on GitLab for source code management and have configured Google Cloud audit event streaming with multiple Group Owners are at risk of internal information disclosure. Exposure of the Public Key could facilitate unauthorized access or manipulation of audit logs or related cloud resources if combined with other vulnerabilities or insider threats. Although the direct impact on confidentiality and integrity is rated low, the vulnerability could undermine trust in audit trail integrity and complicate compliance with European data protection regulations such as GDPR, which emphasize secure handling of sensitive information. Additionally, the vulnerability could increase insider threat risks, as privileged users might access sensitive keys beyond their intended permissions. This could be particularly concerning for organizations in regulated sectors like finance, healthcare, or critical infrastructure, where audit integrity and key confidentiality are paramount. However, since exploitation requires high privileges and no known exploits exist, the immediate risk is moderate but should not be ignored.

Mitigation Recommendations

European organizations should promptly update GitLab EE to versions 16.2.5, 16.3.1, or later, where this vulnerability is patched. Until updates can be applied, organizations should review and restrict the number of Group Owners to the minimum necessary, reducing the attack surface. Implement strict access controls and auditing on privileged accounts to detect any unauthorized attempts to access sensitive keys. Additionally, organizations should consider rotating the affected Public Keys used for Google Cloud Logging audit event streaming after patching to invalidate any potentially exposed keys. Monitoring and alerting on unusual access patterns to audit configurations or key management interfaces can help detect exploitation attempts. Finally, organizations should review their internal policies regarding key management and privilege separation to ensure sensitive information is not unnecessarily exposed to multiple privileged users.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2023-07-25T17:30:22.877Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ea68a0acd01a249253f72

Added to database: 5/22/2025, 4:22:34 AM

Last enriched: 7/7/2025, 11:41:07 AM

Last updated: 8/12/2025, 8:50:50 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats