CVE-2023-3932

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-3932
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-3932.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-3932
Aliases
Published
2023-08-03T04:01:58.186Z
Modified
2025-11-29T15:25:00.372112Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N CVSS Calculator
Summary
Incorrect User Management in GitLab
Details

An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies.

Database specific
{
    "cwe_ids": [
        "CWE-286"
    ],
    "cna_assigner": "GitLab",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/3xxx/CVE-2023-3932.json"
}
References

Affected packages

Git / gitlab.com/gitlab-org/gitlab

Affected ranges

Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "13.12"
        },
        {
            "fixed": "16.0.8"
        }
    ]
}
Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "16.1.0"
        },
        {
            "fixed": "16.1.3"
        }
    ]
}
Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "16.2.0"
        },
        {
            "fixed": "16.2.2"
        }
    ]
}

Affected versions

v16.*

v16.1.0-ee
v16.1.1-ee
v16.1.2-ee
v16.2.0-ee
v16.2.1-ee