Vulnerability Description
Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 9.5.0, < 16.2.8 |
| Hashicorp | Consul | < 0.9.4 |
References
- https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/8171ExploitIssue Tracking
- https://www.hashicorp.com/blog/protecting-consul-from-rce-risk-in-specific-confiPatchVendor Advisory
- https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/8171ExploitIssue Tracking
- https://www.hashicorp.com/blog/protecting-consul-from-rce-risk-in-specific-confiPatchVendor Advisory
FAQ
What is CVE-2023-5332?
CVE-2023-5332 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only a...
How severe is CVE-2023-5332?
CVE-2023-5332 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5332?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab, Hashicorp Consul.