Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-wbbc-jcdc-p7dy
SummaryAn issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
Aliases
0
alias CVE-2023-2825
Fixed_packages
0
url pkg:deb/debian/gitlab@0?distro=sid
purl pkg:deb/debian/gitlab@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gitlab@0%3Fdistro=sid
1
url pkg:deb/debian/gitlab@17.6.5-19?distro=sid
purl pkg:deb/debian/gitlab@17.6.5-19?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gitlab@17.6.5-19%3Fdistro=sid
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2825
reference_id
reference_type
scores
0
value 0.92182
scoring_system epss
scoring_elements 0.99712
published_at 2026-04-13T12:55:00Z
1
value 0.92182
scoring_system epss
scoring_elements 0.99719
published_at 2026-04-26T12:55:00Z
2
value 0.92182
scoring_system epss
scoring_elements 0.99718
published_at 2026-04-24T12:55:00Z
3
value 0.92182
scoring_system epss
scoring_elements 0.99716
published_at 2026-04-21T12:55:00Z
4
value 0.92182
scoring_system epss
scoring_elements 0.99714
published_at 2026-04-18T12:55:00Z
5
value 0.92182
scoring_system epss
scoring_elements 0.99713
published_at 2026-04-16T12:55:00Z
6
value 0.92301
scoring_system epss
scoring_elements 0.9972
published_at 2026-04-04T12:55:00Z
7
value 0.92301
scoring_system epss
scoring_elements 0.99719
published_at 2026-04-02T12:55:00Z
8
value 0.92301
scoring_system epss
scoring_elements 0.99721
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2825
1
reference_url https://hackerone.com/reports/1994725
reference_id 1994725
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-01-15T15:45:06Z/
url https://hackerone.com/reports/1994725
2
reference_url https://gitlab.com/gitlab-org/gitlab/-/issues/412371
reference_id 412371
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-01-15T15:45:06Z/
url https://gitlab.com/gitlab-org/gitlab/-/issues/412371
3
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2825.json
reference_id CVE-2023-2825.json
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-01-15T15:45:06Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2825.json
Weaknesses
Exploits
0
date_added null
description
GitLab version 16.0 contains a directory traversal for arbitrary file read
          as the `gitlab-www` user. This module requires authentication for exploitation.
          In order to use this module, a user must be able to create a project and groups.
          When exploiting this vulnerability, there is a direct correlation between the traversal
          depth, and the depth of groups the vulnerable project is in. The minimum for this seems
          to be 5, but up to 11 have also been observed. An example of this, is if the directory
          traversal needs a depth of 11, a group
          and 10 nested child groups, each a sub of the previous, will be created (adding up to 11).
          Visually this looks like:
          Group1->sub1->sub2->sub3->sub4->sub5->sub6->sub7->sub8->sub9->sub10.
          If the depth was 5, a group and 4 nested child groups would be created.
          With all these requirements satisfied a dummy file is uploaded, and the full
          traversal is then executed. Cleanup is performed by deleting the first group which
          cascades to deleting all other objects created.
required_action null
due_date null
notes
Stability:
  - crash-safe
Reliability: []
SideEffects:
  - ioc-in-logs
known_ransomware_campaign_use false
source_date_published 2023-05-23
exploit_type null
platform
source_date_updated null
data_source Metasploit
source_url https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/gather/gitlab_authenticated_subgroups_file_read.rb
Severity_range_score10.0 - 10.0
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-wbbc-jcdc-p7dy