Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
CVE-2023-1555 CVSS:2.7
GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by improper permission validation. By sending a specially crafted request, an attacker could exploit this vulnerability to access the API.
CVE-2023-0120 CVSS:3.5
GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by improper permission validation. By sending a specially crafted request, an attacker could exploit this vulnerability to edit labels description.
CVE-2023-1279 CVSS:3.5
GitLab could allow a remote authenticated attacker to conduct phishing attacks, caused by an open redirect vulnerability. An attacker could exploit this vulnerability using a specially crafted URL to redirect a victim to arbitrary Web sites.
CVE-2023-4647 CVSS:5.3
GitLab is vulnerable to a denial of service, caused by a flaw in projects API pagination. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-3205 CVSS:6.5
GitLab is vulnerable to a denial of service, caused by a ReDoS in bulk import API. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-4018 CVSS:4.3
GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by improper permission validation. By sending a specially crafted request, an attacker could exploit this vulnerability to create model experiments in public projects.
CVE-2023-4638 CVSS:4.3
GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by improper permission validation. By sending a specially crafted request, an attacker could exploit this vulnerability to fork a project outside of current group by an unauthorized user.
CVE-2022-4343 CVSS:5
GitLab could allow a remote authenticated attacker to obtain sensitive information. By sending a specially crafted request, a remote attacker could exploit this vulnerability to leak credentials stored in site profile.
CVE-2023-4630 CVSS:5
GitLab could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw in project import endpoint. By sending a specially crafted request, a remote attacker could exploit this vulnerability to read limited information about any project’s imports.
CVE-2023-3950 CVSS:5.5
GitLab could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw in GitLab UI. By changing the configured URL, a remote attacker could exploit this vulnerability to see the Public Key for a Google Cloud Logging audit event streaming destination.
CVE-2023-4378 CVSS:5.5
GitLab could allow a remote authenticated attacker to obtain sensitive information. By changing the configured URL, a remote attacker could exploit this vulnerability to obtain sensitive information.
CVE-2023-3915 CVSS:6.5
GitLab could allow a remote authenticated attacker to gain elevated privileges on the system. By creating a service account in that group, an attacker could exploit this vulnerability to escalate privileges.
GitLab
Refer to GitLab Web site for patch, upgrade or suggested workaround information.