chief security officer
  • macropolicy
  • Industrial Development
  • CSO·Insight
  • Threat intelligence
  • Data Security
  • privacy protection
  • Cloud security
  • en_USEN
    • de_DEDE
    • ru_RURU
    • zh_CNCN
    • zh_TWTW
    • jaJP
    • ko_KRKR
Sign in Sign up
Creation Center
  1. chief security officerHome
  2. intelligence gathering

GitLab Releases Security Patches to Fix High-Risk Vulnerabilities

chief security officer • January 14, 2024 at 6:36 pm • intelligence gathering • 7533 views

GitLab has released a security update that fixes two critical vulnerabilities, one of which (CVE-2023-7028) allows an attacker to exploit a flaw in the mailbox authentication process to hijack a user account by sending a password reset email to an unauthenticated mailbox. The vulnerability affects multiple versions of GitLab Community Edition (CE) and Enterprise Edition (EE).GitLab has released a fix and advises users to upgrade to the fixed version as soon as possible and enable dual authentication for added security.

Table of contents

  • summarize
  • Vulnerability Details
  • Affected versions
  • Restoration measures
  • suggestion

summarize

GitLab has released a security update that fixes two critical vulnerabilities, one of which can be exploited for account hijacking without user interaction.

Vulnerability Details

CVE-2023-7028

The vulnerability, numbered CVE-2023-7028, received the highest rating of 10.0 in the CVSS scoring system, and allows an attacker to hijack an account by simply sending a password reset email to an unauthenticated email address.

The vulnerability stems from a flaw in the mailbox validation process that allows users to reset their passwords via a secondary mailbox.

Affected versions

All unmanaged instances of GitLab Community Edition (CE) and Enterprise Edition (EE) that use the following versions are affected:

  • Version 16.1, less than 16.1.6
  • Version 16.2, less than 16.2.9
  • Version 16.3, less than 16.3.7
  • Version 16.4, less than 16.4.5
  • Version 16.5, less than 16.5.6
  • Version 16.6, less than 16.6.4
  • Version 16.7, less than 16.7.2

Restoration measures

GitLab said it fixed the vulnerability in GitLab versions 16.5.6, 16.6.4, and 16.7.2 and ported the fix to versions 16.1.6, 16.2.9, 16.3.7, and 16.4.5.

suggestion

To mitigate potential threats, it is recommended that you upgrade your instance to the fixed version as soon as possible and enable dual authentication, especially for users with elevated privileges, and double-check even if you have previously enabled dual authentication.

Original article by Chief Security Officer, if reproduced, please credit https://www.cncso.com/en/gitlab-releases-security-patch-to-fixed-high-risk-vulnerabilities.html

2FA VerificationCVE-2023-7028GitLab Security BulletinGitLab Vulnerabilitiesaccount hijacking attack
Like (0)
0 0
Generate poster

About the author

chief security officer

chief security officer

112 posts
4 comments
1 questions
3 answers
4 followers
Chief Security Officer (cncso.com)
Five years of safe operation practice summary and future thinking
Previous January 12, 2024 at 9:25 pm
Critical Remote Code Execution (RCE) Vulnerability Found in Juniper SRX Firewalls and EX Switches
Next January 14, 2024 at 7:45 pm
chief security officer
chief security officer
chief security officer

Chief Security Officer (cncso.com)

112 posts
4 comments
1 questions
3 answers
4 followers

Recent Posts

  • Bloody Wolf Organizes Report on Cyberattacks Impersonating Central Asian Government Agencies
  • CVE-2025-47812: Wing FTP Server Remote Code Execution Vulnerability
  • Google chrome V8 JavaScript Engine Type Obfuscation Remote Code Execution Vulnerability
  • Industrial Control System Security Vulnerability Analysis Report 2025
  • Apple iMessage Zero-Click (Zero-Click) Vulnerability (CVE-2025-43200)
  • Google chrome V8 JavaScript engine out-of-bounds read/write vulnerability (CVE-2025-5419)
  • AI zero-hit vulnerability: can steal Microsoft 365 Copilot data
  • The Economics of Cybersecurity in Emerging Markets
  • Global DevSecOps Status Survey Report 2024
  • CVE-2025-21298: Microsoft Outlook 0-Click Remote Code Execution Vulnerability

Recommended reading

  • Artificial Intelligence (AI) Big Model Security Risks and Defense In-Depth Report

    Artificial Intelligence (AI) Big Model Security Risks and Defense In-Depth Report

    November 29, 2025

  • Bloody Wolf Organizes Report on Cyberattacks Impersonating Central Asian Government Agencies

    Bloody Wolf Organizes Report on Cyberattacks Impersonating Central Asian Government Agencies

    November 28, 2025

  • CVE-2025-47812: Wing FTP Server Remote Code Execution Vulnerability

    CVE-2025-47812: Wing FTP Server Remote Code Execution Vulnerability

    November 2, 2025

  • Google chrome V8 JavaScript Engine Type Obfuscation Remote Code Execution Vulnerability

    Google chrome V8 JavaScript Engine Type Obfuscation Remote Code Execution Vulnerability

    July 2, 2025

  • Industrial Control System Security Vulnerability Analysis Report 2025

    Industrial Control System Security Vulnerability Analysis Report 2025

    July 2, 2025

  • Apple iMessage Zero-Click (Zero-Click) Vulnerability (CVE-2025-43200)

    Apple iMessage Zero-Click (Zero-Click) Vulnerability (CVE-2025-43200)

    June 15, 2025

  • Google chrome V8 JavaScript engine out-of-bounds read/write vulnerability (CVE-2025-5419)

    Google chrome V8 JavaScript engine out-of-bounds read/write vulnerability (CVE-2025-5419)

    June 12, 2025

  • AI zero-hit vulnerability: can steal Microsoft 365 Copilot data

    AI zero-hit vulnerability: can steal Microsoft 365 Copilot data

    June 12, 2025

  • The Economics of Cybersecurity in Emerging Markets

    The Economics of Cybersecurity in Emerging Markets

    March 1, 2025

  • Interpretation of the Administrative Measures for Compliance Audit of Personal Information Protection

    Interpretation of the Administrative Measures for Compliance Audit of Personal Information Protection

    February 17, 2025

chief security officer
  • fig. beginning
  • My Account
  • Creation Center
  • Privacy Policy
  • safe community
  • about Us
  • Sitemap

Copyright © 2020 Chief Security Officer. All Rights Reserved.

Zhejiang ICP No. 2023041448 Zhejiang Public Network Security No. 33011002017423