{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5332","assignerOrgId":"ceab7361-8a18-47b1-92ba-4d7d25f6715a","state":"PUBLISHED","assignerShortName":"GitLab","dateReserved":"2023-10-02T12:01:25.316Z","datePublished":"2023-12-04T06:30:33.856Z","dateUpdated":"2024-10-03T06:23:16.051Z"},"containers":{"cna":{"affected":[{"cpes":["cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"GitLab","repo":"git://git@gitlab.com:gitlab-org/gitlab.git","vendor":"GitLab","versions":[{"lessThan":"16.2.8","status":"affected","version":"9.5.0","versionType":"semver"},{"lessThan":"16.3.5","status":"affected","version":"16.3.0","versionType":"semver"},{"lessThan":"16.4.1","status":"affected","version":"16.4","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"This issue was reported internally."}],"descriptions":[{"lang":"en","value":"Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1395","description":"CWE-1395: Dependency on Vulnerable Third-Party Component","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"ceab7361-8a18-47b1-92ba-4d7d25f6715a","shortName":"GitLab","dateUpdated":"2024-10-03T06:23:16.051Z"},"references":[{"name":"GitLab Issue #8171","tags":["issue-tracking"],"url":"https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/8171"},{"url":"https://www.hashicorp.com/blog/protecting-consul-from-rce-risk-in-specific-configurations"}],"solutions":[{"lang":"en","value":"Upgrade to versions 16.2.8, 16.3.5, 16.4.1 or above."}],"title":"Dependency on Vulnerable Third-Party Component in GitLab"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:52:08.548Z"},"title":"CVE Program Container","references":[{"url":"https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/8171","name":"GitLab Issue #8171","tags":["issue-tracking","x_transferred"]},{"url":"https://www.hashicorp.com/blog/protecting-consul-from-rce-risk-in-specific-configurations","tags":["x_transferred"]}]}]}}