Rewterz Threat Alert – Mekotio Banking Trojan aka Melcoz – Active IOCs
March 3, 2023Rewterz Threat Advisory – Multiple Cisco Products Vulnerabilities
March 3, 2023Rewterz Threat Alert – Mekotio Banking Trojan aka Melcoz – Active IOCs
March 3, 2023Rewterz Threat Advisory – Multiple Cisco Products Vulnerabilities
March 3, 2023Severity
Medium
Analysis Summary
CVE-2023-1084 CVSS:2.7
GitLab Community and Enterprise Edition could allow a remote authenticated attacker to gain elevated privileges on the system, caused by improper permission validation. By sending a specially-crafted request, an authenticated attacker could exploit this vulnerability to create a Project Access Token with Owner level privileges.
CVE-2022-3381 CVSS:4.3
GitLab Community and Enterprise Edition could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability. An attacker could exploit this vulnerability using a specially-crafted URL to redirect a victim to arbitrary Web sites.
CVE-2023-1072 CVSS:4.3
GitLab Community and Enterprise Edition are vulnerable to a denial of service, caused by improper filtering for number of requests to read commits details. By sending a specially-crafted request, a remote autheticated attacker could exploit this vulnerability to cause a denial of service condition.
CVE-2022-4462 CVSS:5
GitLab Community and Enterprise Edition could allow a remote authenticated attacker to obtain sensitive information, caused by improper access control. By sending a specially-crafted request to unmask the Discord Webhook URL, an attacker could exploit this vulnerability to obtain group integration settings information, and use this information to launch further attacks against the affected system.
CVE-2023-0223 CVSS:5.3
GitLab Community and Enterprise Edition could allow a remote attacker to obtain sensitive information, caused by improper access control by the API. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain release descriptions, and use this information to launch further attacks against the affected system.
CVE-2022-3758 CVSS:5.4
GitLab Community and Enterprise Edition could allow a remote authenticated attacker to bypass security restrictions, caused by improper user right checks for personal snippets. By sending a specially-crafted request, an attacker could exploit this vulnerability to read, add or edit a users private snippet.
CVE-2022-4007 CVSS:5.4
GitLab Community and Enterprise Edition are vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the title field of work items. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2023-0483 CVSS:5.5
GitLab Community and Enterprise Edition could allow a remote authenticated attacker to obtain sensitive information, caused by improper access control. By sending a specially-crafted request to modify the site, an attacker could exploit this vulnerability to obtain the Datadog integration API key, and use this information to launch further attacks against the affected system.
CVE-2022-4331 CVSS:5.7
GitLab Community and Enterprise Edition could allow a remote authenticated attacker to bypass security restrictions, caused by improper validation of SSO and SCIM tokens while managing groups. By sending a specially-crafted request, an attacker could exploit this vulnerability to gain access to the group via SSO or a SCIM token to perform actions on the group.
CVE-2022-4289 CVSS:6.4
GitLab Community and Enterprise Edition could allow a remote authenticated attacker to obtain sensitive information, caused by an issue with Prometheus integration Google IAP details are not hidden. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain instance, group, or project settings information, and use this information to launch further attacks against the affected system.
CVE-2023-0050 CVSS:8.7
GitLab Community and Enterprise Edition are vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the Kroki diagram. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Impact
- Privilege Escalation
- Gain Access
- Denial of Service
- Information Disclosure
- Security Bypass
- Cross-Site Scripting
Indicators Of Compromise
CVE
- CVE-2023-1084
- CVE-2022-3381
- CVE-2023-1072
- CVE-2022-4462
- CVE-2023-0223
- CVE-2022-3758
- CVE-2022-4007
- CVE-2023-0483
- CVE-2022-4331
- CVE-2022-4289
- CVE-2023-0050
Affected Vendors
GitLab
Affected Products
- GitLab Enterprise Edition (EE) 15.9.0
- GitLab Enterprise Edition (EE) 15.8.0
- GitLab Community Edition (CE) 15.8.0
- GitLab Community Edition (CE) 15.7.0
- GitLab Enterprise Edition (EE) 15.7.0
- GitLab Community Edition (CE) 15.9.0
Remediation
Refer to GitLab Website for patch, upgrade or suggested workaround information.