HomePentest-Tools.com Logo

Gitlab - Arbitrary File Read CVE-2023-2825

Severity
CVSSv3 Score
7.5
Vulnerability description

Gitlab is vulnerable to CVE-2023-2825, a Path Traversal vulnerability that can be leveraged to achieve arbitrary file read, affecting two files, /app/uploaders/object_storage.rb and /app/controllers/concerns/uploads_actions.rb. The root cause of this vulnerability is improper sanitization of user-provided input in the URL by accessing at least five nested groups of a project. This vulnerability allows an unauthenticated remote attacker to exploit a Path Traversal vulnerability, leading to an Arbitrary File Read.

Risk description

The risk exists that an unauthenticated remote attacker could leverage the path traversal vulnerability to read files from the server and stealing confidential information or pivot to the internal network.

Exploit capabilities

Sniper can read arbitrary files from the target system and extract them as evidence.

Recommendation

Update the GitLab server to one of the currently fixed versions: 16.0.1.

Codename
Not available
Detectable with
Network Scanner
Scan engine
Sniper
Exploitable with Sniper
Yes
CVE Published
May 26, 2023
Detection added at
Software Type
Version Control System
Vendor
GitLab Inc
Product
GitLab