Home

Description

An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A malicious Maintainer can, under specific circumstances, leak the sentry token by changing the configured URL in the Sentry error tracking settings page. This was as a result of an incomplete fix for CVE-2022-4365.

PUBLISHED Reserved 2023-08-16 | Published 2023-09-01 | Updated 2025-05-23 | Assigner GitLab




MEDIUM: 5.5CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-201: Insertion of Sensitive Information Into Sent Data

Product status

Default status
unaffected

11.8 (semver) before 16.1.5
affected

16.2 (semver) before 16.2.5
affected

16.3 (semver) before 16.3.1
affected

Credits

Thanks [70rpedo](https://hackerone.com/70rpedo) for reporting this vulnerability through our HackerOne bug bounty program finder

References

gitlab.com/gitlab-org/gitlab/-/issues/422134 (GitLab Issue #422134) issue-tracking

hackerone.com/reports/2104591 (HackerOne Bug Bounty Report #2104591) technical-description exploit

gitlab.com/gitlab-org/gitlab/-/issues/422134 (GitLab Issue #422134) issue-tracking

hackerone.com/reports/2104591 (HackerOne Bug Bounty Report #2104591) technical-description exploit

cve.org (CVE-2023-4378)

nvd.nist.gov (CVE-2023-4378)

Download JSON