{"id":"CVE-2023-0989","summary":"Improper Ownership Management in GitLab","details":"An information disclosure issue in GitLab CE/EE affecting all versions starting from 13.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows an attacker to extract non-protected CI/CD variables by tricking a user to visit a fork with a malicious CI/CD configuration.","aliases":["BIT-gitlab-2023-0989"],"modified":"2026-04-10T04:55:14.502760Z","published":"2023-09-29T06:30:56.081Z","database_specific":{"cna_assigner":"GitLab","cwe_ids":["CWE-282"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/0xxx/CVE-2023-0989.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/0xxx/CVE-2023-0989.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0989"},{"type":"REPORT","url":"https://gitlab.com/gitlab-org/gitlab/-/issues/417275"},{"type":"REPORT","url":"https://hackerone.com/reports/1875515"},{"type":"PACKAGE","url":"git://git@gitlab.com:gitlab-org/gitlab.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"0"},{"fixed":"7fc27fe692abccaed7e2e0ebfea2aadf5140593f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"16.2.8"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"3dfd4e0bcc7eae4330e7fed87ec74bee9a8bdf2d"},{"fixed":"40d6bde8c59f78957b08b3a7cd9622a97b7af981"}],"database_specific":{"versions":[{"introduced":"16.3"},{"fixed":"16.3.5"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"e4c1c182610739c1b1d10a8eacbea1f5aa837ad6"},{"fixed":"229bc5f59850b16213b035138ad76f65b6724864"}],"database_specific":{"versions":[{"introduced":"16.4"},{"fixed":"16.4.1"}]}}],"versions":["11-10-0cfa69752d8-0d9531c80-ee","11-10-0cfa69752d8-74ffd66ae-ee","11-10-119f9509d50-6d7537235-ee","v1.2.0","v1.2.0pre","v1.2.1","v1.2.2","v16.2.0-ee","v16.2.0-rc42-ee","v16.2.0-rc43-ee","v16.2.0-rc44-ee","v16.2.0-rc45-ee","v16.2.1-ee","v16.2.3-ee","v16.2.4-ee","v16.2.6-ee","v16.3.0-ee","v16.3.2-ee","v16.3.3-ee","v16.4.0-ee","v2.3.0","v2.3.0pre","v2.3.1","v2.4.0","v2.4.0pre","v2.4.1","v2.5.0","v2.6.0","v2.6.0pre","v2.6.1","v2.6.2","v2.6.3","v2.7.0","v2.7.0pre","v2.8.0","v2.8.0pre","v2.8.1","v2.8.2","v2.9.0","v2.9.1","v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.1.0","v4.0.0","v4.0.0rc1","v4.0.0rc2","v5.0.0","v5.1.0","v5.2.0","v6.0.0-ee","v6.0.0-ee.beta","v6.0.0-ee.rc1","v6.1.0-ee","v6.3.0-ee","v6.3.1-ee","v6.4.0-ee","v6.5.0-ee","v6.6.0-ee","v6.7.0-ee","v6.7.0.rc1-ee","v6.8.0-ee","v7.0.0-ee","v7.1.0-ee","v7.1.0.rc1-ee","v7.2.0.rc1-ee","v7.2.0.rc2-ee","v7.2.0.rc3-ee","v7.2.0.rc4-ee","v7.2.0.rc5-ee","v7.3.0-ee","v7.3.0.rc1-ee"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-0989.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}