Skip to main content

CVE-2023-4700: CWE-862: Missing Authorization in GitLab GitLab

Low
VulnerabilityCVE-2023-4700cvecve-2023-4700cwe-862
Published: Mon Nov 06 2023 (11/06/2023, 17:30:35 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

An authorization issue affecting GitLab EE affecting all versions from 14.7 prior to 16.3.6, 16.4 prior to 16.4.2, and 16.5 prior to 16.5.1, allowed a user to run jobs in protected environments, bypassing any required approvals.

AI-Powered Analysis

AILast updated: 07/07/2025, 11:43:02 UTC

Technical Analysis

CVE-2023-4700 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting GitLab Enterprise Edition (EE) versions from 14.7 up to but not including 16.3.6, 16.4 up to but not including 16.4.2, and 16.5 up to but not including 16.5.1. The flaw allows an authenticated user with limited privileges (low privileges) to bypass authorization controls and run jobs in protected environments without requiring the normally mandated approvals. Protected environments in GitLab are typically used to safeguard critical deployment stages such as production or staging, where running jobs usually requires explicit approval to prevent unauthorized or accidental changes. This vulnerability arises because the authorization checks that enforce these approval requirements are missing or improperly implemented, allowing users to execute potentially sensitive deployment jobs without oversight. The CVSS v3.1 base score is 3.5, indicating a low severity primarily due to the requirement of network access, low privileges, and high attack complexity, with no user interaction needed. The impact is limited to confidentiality as the vulnerability does not affect integrity or availability directly. No known exploits are currently reported in the wild, and no official patch links were provided at the time of publication, though GitLab has likely addressed this in subsequent releases beyond the affected versions.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality of deployment environments managed via GitLab EE. Unauthorized execution of jobs in protected environments could lead to exposure of sensitive deployment configurations, environment variables, or secrets used during deployment pipelines. While the vulnerability does not directly compromise integrity or availability, the ability to run jobs without approval could be leveraged in chained attacks to gather intelligence or prepare for further exploitation. Organizations relying heavily on GitLab for CI/CD pipelines, especially those with strict compliance and regulatory requirements around deployment controls (e.g., financial institutions, healthcare, critical infrastructure), could face increased risk of unauthorized access to sensitive deployment data. The low CVSS score and absence of known exploits suggest the threat is currently limited, but the potential for misuse in targeted attacks remains, particularly in environments with lax internal access controls or where users have broad access to GitLab projects.

Mitigation Recommendations

European organizations should immediately verify their GitLab EE versions and upgrade to patched versions beyond 16.3.6, 16.4.2, or 16.5.1 as applicable. Until patches are applied, organizations should enforce strict access controls on GitLab users, limiting permissions to only those necessary for job execution. Review and tighten approval workflows for protected environments to include additional manual checks outside GitLab if possible. Audit existing job definitions and pipeline configurations to detect any unauthorized or suspicious jobs running in protected environments. Implement monitoring and alerting on deployment activities to detect anomalous job executions. Additionally, consider isolating critical deployment environments and secrets management from GitLab pipelines to reduce exposure if unauthorized jobs run. Finally, maintain awareness of GitLab security advisories for any updates or exploit reports related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2023-09-01T06:01:16.407Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ea68a0acd01a249253f91

Added to database: 5/22/2025, 4:22:34 AM

Last enriched: 7/7/2025, 11:43:02 AM

Last updated: 8/15/2025, 1:25:11 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats