![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Advisory – CVE-2023-20877 – VMware Aria Operations Vulnerability
May 12, 2023![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Alert – STRRAT Malware – Active IOCs
May 12, 2023![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Advisory – CVE-2023-20877 – VMware Aria Operations Vulnerability
May 12, 2023![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Alert – STRRAT Malware – Active IOCs
May 12, 2023Severity
Medium
Analysis Summary
CVE-2023-2181
GitLab could allow a remote authenticated attacker to bypass security restrictions. By using a git feature called refs/replace, an attacker could exploit this vulnerability to smuggle content into a merge request.
Impact
- Security Bypass
Indicators Of Compromise
CVE
- CVE-2023-2181
Affected Vendors
GitLab
Affected Products
- GitLab Community Edition 15.10.6
- GitLab Community Edition 15.11.2
- GitLab Community Edition 15.9.7
- GitLab Enterprise Edition 15.9.7
- GitLab Enterprise Edition 15.10.6
- GitLab Enterprise Edition 15.11.2
Remediation
Refer to GitLab Web site for patch, upgrade or suggested workaround information.