Skip to main content

CVE-2023-3964: CWE-863: Incorrect Authorization in GitLab GitLab

Medium
VulnerabilityCVE-2023-3964cvecve-2023-3964cwe-863
Published: Fri Dec 01 2023 (12/01/2023, 07:02:18 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

An issue has been discovered in GitLab affecting all versions starting from 13.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for users to access composer packages on public projects that have package registry disabled in the project settings.

AI-Powered Analysis

AILast updated: 07/07/2025, 20:12:01 UTC

Technical Analysis

CVE-2023-3964 is a medium-severity vulnerability affecting GitLab versions starting from 13.2 up to but not including 16.4.3, versions from 16.5 up to but not including 16.5.3, and versions from 16.6 up to but not including 16.6.1. The vulnerability is classified under CWE-863, which relates to incorrect authorization. Specifically, the issue allows users with certain privileges to access composer packages on public projects even when the package registry feature is disabled in the project settings. This means that the access control mechanism intended to restrict package registry access is bypassed, potentially exposing package contents that project owners intended to keep inaccessible. The vulnerability requires network access (AV:N), low attack complexity (AC:L), and privileges (PR:L) but does not require user interaction (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches are linked in the provided information, though it is implied that fixed versions exist beyond the affected versions. This vulnerability could lead to unauthorized disclosure of package data, which might include sensitive or proprietary code or dependencies, potentially aiding attackers in reconnaissance or further attacks.

Potential Impact

For European organizations using GitLab for software development and package management, this vulnerability could lead to unintended exposure of internal or proprietary composer packages. Such exposure could compromise confidentiality by revealing source code or dependencies that organizations rely on for their software products. This could facilitate intellectual property theft or provide attackers with information to craft targeted attacks, including supply chain attacks. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and critical infrastructure, may face compliance risks if sensitive information is leaked. Although the vulnerability does not affect integrity or availability, the confidentiality breach alone can have significant reputational and operational consequences. Since the vulnerability affects public projects with package registry disabled, organizations relying on GitLab's package registry feature to control access must be particularly vigilant. The medium severity rating suggests that while the risk is not critical, it should not be ignored, especially in environments with sensitive development assets.

Mitigation Recommendations

European organizations should promptly verify their GitLab versions and upgrade to fixed versions beyond 16.4.3, 16.5.3, or 16.6.1 as applicable. Until upgrades are applied, organizations should audit public projects to ensure that sensitive composer packages are not exposed unintentionally. Consider temporarily disabling public access to projects containing sensitive packages or migrating such packages to private projects with stricter access controls. Review and tighten project-level permissions and package registry settings to ensure they align with organizational policies. Implement monitoring and alerting for unusual access patterns to package registries. Additionally, organizations should maintain an inventory of packages hosted in GitLab and assess the sensitivity of their contents. Employ network segmentation and access controls to limit exposure of GitLab instances to trusted users and networks. Finally, stay informed about GitLab security advisories for any patches or additional mitigations related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2023-07-26T22:30:27.029Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ea68a0acd01a249253f7f

Added to database: 5/22/2025, 4:22:34 AM

Last enriched: 7/7/2025, 8:12:01 PM

Last updated: 8/3/2025, 8:01:40 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats