Skip to main content

CVE-2023-5009: CWE-863: Incorrect Authorization in GitLab GitLab

Critical
VulnerabilityCVE-2023-5009cvecve-2023-5009cwe-863
Published: Tue Sep 19 2023 (09/19/2023, 07:01:14 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This was a bypass of [CVE-2023-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932) showing additional impact.

AI-Powered Analysis

AILast updated: 07/07/2025, 11:55:18 UTC

Technical Analysis

CVE-2023-5009 is a critical security vulnerability identified in GitLab Enterprise Edition (EE) affecting all versions from 13.12 up to but not including 16.2.7, and versions from 16.3 up to but not including 16.3.4. The vulnerability is classified under CWE-863, which pertains to incorrect authorization. Specifically, this flaw allows an attacker to execute pipeline jobs as an arbitrary user by exploiting scheduled security scan policies. This means an attacker with limited privileges can bypass intended access controls and escalate their permissions to impersonate other users within the GitLab environment. The vulnerability is a bypass of a previously known issue (CVE-2023-3932), but with additional impact, indicating a broader scope or more severe consequences. The CVSS v3.1 base score is 9.6, reflecting a critical severity level. The vector string (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N) indicates that the attack can be performed remotely over the network, requires low privileges, no user interaction, and results in a complete breach of confidentiality and integrity with no impact on availability. The vulnerability affects the core CI/CD pipeline functionality, which is central to software development workflows in GitLab, making it a highly sensitive and impactful flaw. No known exploits are currently reported in the wild, but the high severity and the nature of the vulnerability suggest that exploitation could lead to unauthorized code execution, data leakage, or manipulation of build processes.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying heavily on GitLab EE for their software development lifecycle. Unauthorized execution of pipeline jobs as arbitrary users can lead to unauthorized access to sensitive source code, credentials, and deployment environments. This can result in intellectual property theft, insertion of malicious code into software builds, and potential compromise of downstream production systems. The breach of confidentiality and integrity can undermine trust in software supply chains, which is critical for sectors such as finance, healthcare, telecommunications, and government agencies prevalent in Europe. Additionally, the cross-tenant impact (scope: changed) means that a compromise in one project or user context could affect others, amplifying the risk in multi-tenant or large enterprise environments. Given the widespread adoption of GitLab in European tech ecosystems, the vulnerability could disrupt development operations and lead to regulatory compliance issues under GDPR if personal data is exposed or manipulated.

Mitigation Recommendations

European organizations should prioritize immediate patching of GitLab EE to versions 16.2.7 or later and 16.3.4 or later where this vulnerability is fixed. Until patches are applied, organizations should restrict access to scheduled security scan policies and pipeline configuration to only highly trusted administrators. Implement strict role-based access controls (RBAC) and audit all pipeline job executions for anomalous behavior. Disable or limit the use of scheduled security scans if feasible. Network-level protections such as firewall rules and VPNs should be enforced to limit exposure of GitLab instances to untrusted networks. Additionally, organizations should monitor GitLab logs for unusual pipeline job executions and user impersonation attempts. Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) tools can help detect exploitation attempts. Finally, organizations should review and harden their CI/CD pipeline security policies, including secrets management and artifact integrity verification, to reduce the impact of any potential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2023-09-15T22:30:36.931Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ea68a0acd01a249253fa4

Added to database: 5/22/2025, 4:22:34 AM

Last enriched: 7/7/2025, 11:55:18 AM

Last updated: 8/17/2025, 7:01:18 PM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats